A-Z Popular New Security Search »
Information Security
 
Related Guides

What is Security Through Obscurity?

 , updated on
Security through obscurity is a design that relies on secrecy to remain secure. It is considered a poor practice as truly secure designs could be openly published and remain secure.

Example

Encryption algorithms are commonly published openly. This makes them more secure over time as peers can review the algorithm and attackers try to find weaknesses in it.
A proprietary encryption algorithm with a secret design may be less secure as some details about its design may be discovered at any time that expose flaws.
Overview: Security Through Obscurity
Type
Definition
A design that relies on secrecy to remain secure.
Related Concepts

Information Security

This is the complete list of articles we have written about information security.
Audit Trail
Canary Trap
Confidential Information
Critical Infrastructure
Cryptographic Keys
Cryptographic Salt
Cryptography
Cybersecurity Risk
Data Breach
Data Remanence
Data Room
Data Security
Deep Magic
Defense In Depth
Degaussing
Digital Identity
Failure Of Imagination
Geofencing
Hardening
Honeypot
IoT Security
Key Stretching
Network Security
Non-repudiation
Nonce
Operations Security
Overlay Network
Password Entropy
Password Fatigue
Proof Of Work
Sandbox
Secure Code Review
Security As A Service
Security Controls
Zero-day
More ...
If you enjoyed this page, please consider bookmarking Simplicable.
 

Security vs Privacy

The relationship between security and privacy.

Hardening

An overview of technology hardening.

Deep Magic

An overview of deep magic, a technology term.

Defense In Depth

An overview of defense In depth.

Encryption Examples

A definition of encryption with examples.

Canary Trap

A definition of canary trap with an example.

Honeypot

A definition of honeypot with examples.

Tokens

A definition of token with examples.

Backdoor

A definition of backdoor with examples.

Encryption Examples

A definition of encryption with examples.

Asymmetric vs Symmetric

The differences between asymmetric and symmetric encryption.

Random Seed

The definition of random seed with examples.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map