What is meant by the phrase "security through obscurity," and why is this concept not accurate?

What will be an ideal response?


Security through obscurity, or the notion that virtually any system can be made secure so long as outsiders are unaware of it or how it functions. However, this is a flawed approach since it is essentially impossible to keep "secrets" from everyone.

Computer Science & Information Technology

You might also like to view...

When you declare a variable in the For clause, the variable stays in the computer's internal memory when the loop ends.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The basic rules that apply to DFD development are: • Each context diagram must fit on one page. • The process name in the context diagram should be the name of the information system. • Use unique names within each set of symbols. • Do not cross lines. • Use a unique reference number for each process symbol. In addition to these rules, the systems analyst must use the proper DFD shapes, connect them correctly, and produce a leveled, balanced set of DFDs.

What will be an ideal response?

Computer Science & Information Technology

In the accompanying figure, item 2 identifies the ____.

A. anchor point B. path C. border point D. holding point

Computer Science & Information Technology

When manually typing criteria such as a date in a function, you must enclose the criteria with ________

A) quotation marks (") B) asterisks (*) C) number signs (#) D) ampersands (@)

Computer Science & Information Technology