In security engineering, security through obscurity is the practice of concealing the details or mechanisms of a system to enhance its security. This approach...
14 KB (1,399 words) - 15:32, 17 May 2024
Kerckhoffs's principle (redirect from Security through transparency)
concept is widely embraced by cryptographers, in contrast to security through obscurity, which is not. Kerckhoffs's principle was phrased by American...
15 KB (1,719 words) - 04:51, 5 April 2024
Secure by design (redirect from Security through design)
Computer security Cyber security standards Hardening Multiple Independent Levels of Security Secure by default Security through obscurity Software Security Assurance...
9 KB (1,072 words) - 13:34, 27 March 2024
Look up obscurity in Wiktionary, the free dictionary. Obscurity may refer to: Security through obscurity, a controversial principle in security engineering...
357 bytes (77 words) - 05:30, 14 May 2021
Robots.txt (section Security)
visit, though standards bodies discourage countering this with security through obscurity. Some archival sites ignore robots.txt. The standard was used...
29 KB (2,776 words) - 17:52, 7 May 2024
users' privacy Security through obscurity – Reliance on design or implementation secrecy for security Separation of protection and security – Mechanism v...
218 KB (22,142 words) - 20:31, 23 May 2024
MAC filtering (category Computer network security)
using that address. MAC address filtering can be considered as security through obscurity because the effectiveness is based on "the secrecy of the implementation...
2 KB (305 words) - 21:53, 19 January 2023
algorithm itself. Analysis of the algorithm shows that it relies on security through obscurity. For example, this renders RTMPE vulnerable to Man in the Middle...
5 KB (680 words) - 13:12, 3 July 2023
technical. Usable security also sits opposite the idea of security through obscurity by working to ensure that users are aware of the security implications...
7 KB (806 words) - 01:36, 15 February 2024
software's closed-source nature and alleged security through obscurity design; UltraReach says their security considerations mean they prefer third party...
15 KB (1,590 words) - 01:28, 5 April 2024
SCADA (redirect from SCADA Security)
networks The belief that SCADA systems have the benefit of security through obscurity through the use of specialized protocols and proprietary interfaces...
38 KB (4,658 words) - 11:29, 26 April 2024
Programmers may deliberately obfuscate code to conceal its purpose (security through obscurity) or its logic or implicit values embedded in it, primarily, in...
15 KB (1,522 words) - 14:24, 27 March 2024
forum for disseminating advisories, explains "We don't believe in security by obscurity, and as far as we know, full disclosure is the only way to ensure...
15 KB (1,594 words) - 15:17, 14 March 2024
in responsible full disclosure. Locksport enthusiasts target security through obscurity that is common within the locksmith industry, as well as among...
9 KB (1,192 words) - 15:16, 25 May 2024
of steganography that lack a formal shared secret are forms of security through obscurity, while key-dependent steganographic schemes try to adhere to Kerckhoffs's...
50 KB (5,799 words) - 02:27, 7 May 2024
His ideas were the basis for many modern security practices, and followed that security through obscurity is a bad practice. Simply making source code...
8 KB (1,027 words) - 01:13, 27 January 2024
Trojan horse Antivirus software Computer insecurity Cryptovirology Security through obscurity Cyberwarfare Computer worm Spyware Virus hoax Zombie computer...
17 KB (419 words) - 05:20, 12 May 2024
speaker at the security conference SAINTCON 2021, where he lambasted locksmiths' complacency and reliance on security through obscurity. LockPickingLawyer's...
7 KB (588 words) - 22:03, 20 May 2024
Security engineering is the process of incorporating security controls into an information system so that the controls become an integral part of the...
13 KB (1,185 words) - 17:27, 25 August 2023
Obfuscation (section Network security)
is sometimes referred to as "talking around" and is a form of security through obscurity. A notable example of obfuscation of written communication is...
7 KB (825 words) - 03:02, 20 May 2024
application security is based on the premise that any application or service (whether it is malware or desirable) relies on security through obscurity. Open...
4 KB (363 words) - 11:48, 7 December 2022
Presumed security is the opposite of security through obscurity. A system relying on security through obscurity may have actual security vulnerabilities...
2 KB (282 words) - 14:33, 22 December 2021
drives. As a closed source product, Share partially relies on security through obscurity. Like many other P2P applications, Share downloads files in blocks...
11 KB (1,131 words) - 21:57, 25 July 2023
ASCF fell into obscurity, and other organizations continued to promote the slogan. The Heritage Foundation and the Center for Security Policy (CSP) have...
23 KB (1,966 words) - 11:16, 27 April 2024
one way of preventing successful attacks is security through obscurity. Keeping the IT department's security systems and practices confidential helps prevent...
10 KB (1,255 words) - 16:35, 16 November 2023
DREAD (risk assessment model) (category Computer security)
different issues. Some security experts feel that including the "Discoverability" element as the last D rewards security through obscurity, so some organizations...
3 KB (273 words) - 01:28, 25 April 2024
system in use. Since cryptographic security should never depend on the obscurity of either (see security through obscurity, specifically both Shannon's Maxim...
12 KB (1,524 words) - 16:53, 11 May 2024
Port knocking (category Internet security)
authentication mechanism for a server. From a security perspective, simple port knocking relies on security through obscurity; unintended publication of the knock...
14 KB (1,893 words) - 13:50, 11 April 2024
Free software (redirect from Security of free software)
debate over the security of free software in comparison to proprietary software, with a major issue being security through obscurity. A popular quantitative...
51 KB (5,493 words) - 19:52, 22 May 2024
Need to know (category Computer security procedures)
(information security) Freedom of information laws by country Mushroom management Principle of least privilege Security through obscurity Feynman, Richard...
5 KB (732 words) - 00:54, 28 January 2024