Network Security guide for the home or small business network – Part 15 – Security Through obscurity



I remember many years ago watching a Dr. Who episode where a very important key was “hidden” in a display of many other keys. Kind of like hiding a tree in a forest. This concept is “security by obscurity”. Generally this is considered a bad approach to security. It is a bad approach if this is the ONLY thing you consider. Many examples are security by obscurity are usually thought of as… proprietary applications that keep source code secret so no one can find what flaws exist, using operating systems or programs that are “obscure” or have small market share and are not targetted.


The first item is obviously one that doesn’t work. How many security vulnerabilities in Windows have been reported from outside Microsoft? I don’t know that there’s an accurate count – point is LOTS. The second one is something I talked about in the last entry. It can help as a part of an overall strategy but shouldn’t be considered the magic bullet. There are some things about the design of Apple and Linux systems that I think discourage the spread of malware if done right, but not every distribution (or user) may “do things right”. Any built in security measure is usually possible to circumvent.

Another angle on security through obscurity is this. Let’s say you decide you DO want to run a webserver on your machine and allow access from the outside world. Let’s say that you don’t want it to be obvious though and decide that instead of the usual port 80, you want it to run on port 8888, then to access it an outsider would have to enter http://yoursiteaddress:8888 The address wouldn’t show up in a typical scan for listening servers on port 80 and it would certainly have less visibility. If it’s configured insecurely though it certainly won’t help protect against someone that discovers it and wants to break in.

So, in certain circumstances, obscuring yourself for security purposes can be useful, but they shouldn’t be relied on as the only way to stay safe.

Related Posts

Blog Traffic Exchange Related Posts
  • Network Security guide for the home or small business network - Part 6 - Secure your services This one is going to be tougher. Of what we've looked at so far this will probably take more work and learning than any of the others. The good news is, depending on your situation you may need to do less here. IF you have decided that your pc (or......
  • Network security - how safe is your network? Looking at ARP A while back I did a network security series and one of the points that I mentioned was that it's important to know what is normal for your network. In other words, what machines are NORMALLY connected, what services are normally running, etc. Well, I'm about to start a serious......
  • Testing your firewall for open ports For several years now I've used a neat tool at Gibson Research to test a clients firewall quick and easy from the web browser. They have a tool called Shields Up that does a limited port scan to determine of network ports are open, closed or "stealth". One of the......
Blog Traffic Exchange Related Websites
  • May issue of BSD magazine- Embedded BSD: FreeBSD and Alix Emailed to us from BSD Magazine: The May issue of BSD magazine is out and full of new content. :) We warm up with Michael Hernandez and his Introduction to Z Shell followed by the Developers Corner. There you will find Dru Lavigne’s article about PC-BSD 9.0 Multiple Desktop Support,......
  • Collecting Money World Wide There are several money collectors here in the United States and around the globe. There are even some people who make special trips to other parts of the world just for the purpose of collecting currencies for their personal collections. Many people go to some of the events and trade......
  • Developing A Daily Schedule To Achieve Goals Recently, Kevin over at No Debt Plan posted about his daily schedule and if it was appropriate for what he wanted to achieve. His excellent post got me thinking about whether or not a more structured daily schedule would allow me to better achieve my goals for 2009. Current Daily......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Leave a Reply

You must be logged in to post a comment.


Switch to our mobile site