What is security by obscurity?

What will be an ideal response?


Suppose a thief who wants to break into a bank plans to attack during a shift change of the security guards at night. When the thief observes the guards, however, he finds that the guards do not change shifts at the same time each night. On Monday they rotate shifts at 11:15 P.M., whereas on Tuesday the shift change occurs at 10:50 P.M., and on Wednesday it is at 11:25 P.M. He cannot determine the times of these changes because they are kept secret. The thief, not knowing when a change takes place, cannot detect a clear pattern of times. Because the shift changes are confusing and not well known, an attack becomes more difficult.This technique is sometimes called "security by obscurity."Obscuring what goes on inside a system or organization and avoiding clear patterns of behavior make attacks from the outside much more difficult.

Computer Science & Information Technology

You might also like to view...

Produce a list of the names of all employees who work on the SCCS project.

What will be an ideal response?

Computer Science & Information Technology

If table structure elements are not required in order for Web documents to be well formed, why include them at all?

What will be an ideal response?

Computer Science & Information Technology

A mobile device can only be synchronized to one desktop

Indicate whether the statement is true or false

Computer Science & Information Technology

Serial killer Dennis Rader sent letters and packages to local media describing his ________

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology