example of security through obscurity - EAS

About 2,380,000,000 results
  1. These are real-life examples of security through obscurity:

    • The door is locked, but the key is hidden under the doormat.
    • Deploying decoy cars around the asset you are trying to protect, with only key players knowing which car the asset is...
    • Using a closed source system that only specific people have knowledge on how it works.
    • Writing your password on a piece of paper and...
    www.okta.com/identity-101/security-through-obscurity/
    www.okta.com/identity-101/security-through-obscurity/
    Was this helpful?
  2. People also ask
    What is security through obscure?
    Security through obscurity (STO) is a controversial principle in security engineering based on the premise that secrecy of an element or function can ensure security of the whole. One of the first lessons any aspiring security professional or system administrator learns is: 'security through obscurity is bad'.
    www.bcs.org/articles-opinion-and-research/security-throu…
    Why is confidentiality by obscurity bad?
    Confidentiality by obscurity can be considered bad because it often implies that obscurity is the main means of confidentiality. Confidentiality is fine as long as it is not discovered, but once someone finds out your particular obscurity, your system is vulnerable again. Never rely on secrecy as your primary method of security.
    Can obscurity measures complement security?
    Obscurity measures can complement Security, and as long as it is not employed in complete isolation, it can be considered another powerful tool to provide defense in depth.
    thecyberpatch.com/security-through-obscurity-the-good-t…
    Is security through obscurity (SBO) accurate?
    While the assumption is not entirely inaccurate, there are a few things you should take into consideration. Used along with other security mechanisms, such as TCP Wrappers, proper firewalling, IP-based restrictions, 2FA, Security Through Obscurity can be a very efficient way to reduce the chances of an attack.
    thecyberpatch.com/security-through-obscurity-the-good-t…
  3. https://www.bcs.org/articles-opinion-and-research/security-through-obscurity

    Jan 18, 2006 · Security through obscurity (STO) is a controversial principle in security engineering based on the premise that secrecy of an element or function can ensure security

  4. https://www.okta.com/identity-101/security-through-obscurity

    Apr 21, 2022 · These are real-life examples of security through obscurity: The door is locked, but the key is hidden under the doormat. Deploying decoy cars around the asset you are trying to …

  5. https://stackoverflow.com/questions/347948

    Aug 06, 2012 · The key to the front door is stashed under a rock nearby, or under the welcome mat, or on top of a high railing. These are all instances of security through obscurity, as in, it is …

    Usage example
    $encrypted_password = md5( sha1( plaintext_password ) );
  6. https://simplicable.com/new/security-through-obscurity

    Mar 20, 2017 · What is Security Through Obscurity? Example. Encryption algorithms are commonly published openly. This makes them more secure over time as peers can review...

  7. Some results have been removed


Results by Google, Bing, Duck, Youtube, HotaVN