From the course: Advanced Windows 11 for Local Administrators

Unlock this course with a free trial

Join today to access over 25,500 courses taught by industry experts.

Explore hardware-based encryption

Explore hardware-based encryption

- [Instructor] Previously we discussed Microsoft Pluton and trusted platform modules shown here in Device Manager. We also learned about hardware based isolation technologies. We can use these to secure a computer system from hardware based attacks among other things. Here we're going to dive a little deeper into hardware based encryption. Hardware based encryption is different from the options you see inside the Windows operating system, which you can access by right clicking a folder, as shown here. Hardware based encryption uses dedicated hardware components to encrypt and decrypt data. It doesn't slow down your machine because it offloads the tasks to a dedicated chip, and it doesn't involve the CPU. This provides better security than other methods because the encryption keys are stored in the hardware, which means it's really hard for hackers to get to them. Beyond that, these chips are generally tamper proof and protect against physical attacks as well. It is crucial to store…

Contents