What is security by obscurity?
What will be an ideal response?
Suppose a thief who wants to break into a bank plans to attack during a shift change of the security guards at night. When the thief observes the guards, however, he finds that the guards do not change shifts at the same time each night. On Monday they rotate shifts at 11:15 P.M., whereas on Tuesday the shift change occurs at 10:50 P.M., and on Wednesday it is at 11:25 P.M. He cannot determine the times of these changes because they are kept secret. The thief, not knowing when a change takes place, cannot detect a clear pattern of times. Because the shift changes are confusing and not well known, an attack becomes more difficult.This technique is sometimes called "security by obscurity."Obscuring what goes on inside a system or organization and avoiding clear patterns of behavior make attacks from the outside much more difficult.
You might also like to view...
What does the following program do?
``` // Printing.java public class Printing { public static void main(String[] args) { for (int i = 1; i <= 10; i++) { for (int j = 1; j <= 5; j++) { System.out.print('@'); } System.out.println(); } } } ```
The _______________ is a package file containing the assets compiled from an Android app?s code that is then used to install the app on an Android device.
Fill in the blank(s) with the appropriate word(s).
Possible security steps to protect and secure a VoIP network include which of the following:
a. Encrypting the VoIP data traffic b. Using firewalls to prevent attacks c. Routing VoIP data traffic on the same LANs as normal data traffic d. All the above
If your macro prompts you for a name, it may contain an error.
Answer the following statement true (T) or false (F)