1/13/2023 0 Comments Security through obscurity![]() ![]() Some computer experts also tout the value of transparent security, suggesting that a strong security system that is completely open to users means that weaknesses will be quickly detected and guarded against.Afrique Francophone Albania Andorra Angola Argentina Armenia Australia Austria Azerbaijan Bahamas Barbados Belgium Belgique Belgiƫ Bermuda Bolivia Bosnia and Herzegovina Botswana Brasil British Virgin Islands Brunei Bulgaria Cambodia Cameroon Canada Cape Verde Caribbean Cayman Islands Central and Eastern Europe Chad Channel Islands Chile China Colombia Congo (Brazzaville) Congo (Dem. Using basic obscurity methods, such as file and user name protection, may work best when in conjunction with methods such as password protection and strong firewalls. ![]() ![]() While security through obscurity may be useful as part of an overall security system, on its own, it may lead to staggering vulnerabilities. Workers entrusted with security information may also have to sign non-disclosure agreements, which can legally forbid them to release security information even after leaving a job. In this way, a developer may be able to keep knowledge of security flaws from spreading, thus providing some means of protection. In some cases, a user may legitimately discover a security flaw and ask the company to provide a patch, only to receive threats of legal action should he or she expose the flaw to the public. ![]() By legally and practically limiting access to program data to designated individuals, some software developers hope to deter hackers and frighten off any person who tries to expose security information. Proprietary techniques are common means of protecting software and operating systems through obscurity. Using techniques that obscure data, or allowing only cleared individuals to access coding or security algorithms can help protect the knowledge from becoming public, and thus open to defeat. Somewhat akin to hiding money under a mattress, this concept works admirably as long as no untrustworthy adversaries know that the money is in the mattress. The basic principle of security through obscurity is quite simple: if data is kept secret, no one outside the protection of the secret can find it. Some experts suggest, however, that this method is simply an illusion, and may actually render computer programs and systems more vulnerable to hackers. Some methods commonly used for security through obscurity include encoding data or creating proprietary information through copyright protection. The underlying assumption is that if only a few trusted people understand the workings of a security system, the system is generally simple. Security through obscurity is a philosophy that suggests obfuscation and secrecy as a primary means of ensuring system or information security. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |