![]() For the former group, the result is still typically more simple than it should be (which is why they didn't bother to figure out the right way to handle it). For the later group, this is ALWAYS done for the purpose of simplicity. In reality, this is a principal mostly used by people who are unsure of the proper way to do something or they are too lazy to do it the right way. In reality, security through obscurity is done (almost) exclusively in order to simplify a system. "Security through obscurity has never achieved engineering acceptance as an approach to securing a system, as it contradicts the principle of simplicity." - This is not correct in any sense for IT. Is this really an example proving that the security by design principle is flawed or the opposite? 1988 is a long time to go without a worm, virus, or other malware outbreak. "e.g., the Morris worm of 1988 spread through some obscure-though widely visible to those who looked-vulnerabilities". (no intention of specific attack) but i can provide lots of references for this claiming. The real truth has proven that many security holes have existed in open source software for instance like the linux kernel and OpenSSL. This is taken as a proof and is completely false. Proponents of this viewpoint expect that the frequency and severity of security compromises will be less severe for open than for proprietary or secret software." More people can review the details of such algorithms, identify flaws, and fix the flaws sooner. "Linus's law that many eyes make all bugs shallow also suggests improved security for algorithms and protocols whose details are published. "Cisco router operating system software was accidentally exposed on a corporate network." Wich is also a true statement however attacks Linux. "Vulnerabilities in various versions of Linux, its default web browser Firefox, and its mail applications Thunderbird have caused worldwide problems when computer viruses, Trojan horses, or computer worms have exploited them." Now this is biased and is an obvious attack to Windows probably by a Windows hater (or linux fanboi). "Vulnerabilities in various versions of Microsoft Windows, its default web browser Internet Explorer, and its mail applications Outlook and Outlook Express have caused worldwide problems when computer viruses, Trojan horses, or computer worms have exploited them." I simply don't know it and usually is regarded as snake oil. Please define "military-grade" if there is such definition. "An example is PGP released as source code, and generally regarded (when properly used) as a military-grade cryptosystem." This article has been rated as C-Class by WikiProject Vital Articles. Security through obscurity has been listed as a level-5 vital article in Technology. This article has not yet received a rating on the project's importance scale. This article has been rated as C-Class on the project's quality scale. Computing Wikipedia:WikiProject Computing Template:WikiProject Computing Computing articles If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks. This article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. Find editors who have shown interest in this subject and ask them to take a look here.Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc. ![]() Identify articles for creation (see also: Article requests).Identify categories related to Computer Security. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |