Give an example of the false sense of security that can come from using the "security by obscurity" approach

What will be an ideal response?


There are many examples. One possibility would be to use a weak encryption
algorithm, like the Caesar cipher and try to keep secret the type of algorithm that you
are using, in addition to keeping the key secret. The problem with this approach is that
if someone guesses you are using such an algorithm or is able to reverse engineering your
software, then they will discover your algorithm. From there it is a simple matter to break
your weak encryption scheme.

Computer Science & Information Technology

You might also like to view...

What domain functional level removes compatibility for Network Access Protection?

A. Windows Server 2008 R2 B. Windows Server 2012 C. Windows Server 2012 R2 D. Windows Server 2016

Computer Science & Information Technology

A(n) _______ is the letter sequence of a variable’s name.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Describe a shell variable.

What will be an ideal response?

Computer Science & Information Technology

The ________ relationship requires a junction table for it to function properly.

What will be an ideal response?

Computer Science & Information Technology