Security through obscurity is a design that relies on secrecy to remain secure. It is considered a poor practice as truly secure designs could be openly published and remain secure. ExampleEncryption algorithms are commonly published openly. This makes them more secure over time as peers can review the algorithm and attackers try to find weaknesses in it. A proprietary encryption algorithm with a secret design may be less secure as some details about its design may be discovered at any time that expose flaws.
|
Type | | Definition | A design that relies on secrecy to remain secure. | Related Concepts | |
Information Security
This is the complete list of articles we have written about information security.
If you enjoyed this page, please consider bookmarking Simplicable.
© 2010-2023 Simplicable. All Rights Reserved. Reproduction of materials found on this site, in any form, without explicit permission is prohibited.
View credits & copyrights or citation information for this page.
|