Network Security guide for the home or small business network – Part 15 – Security Through obscurity



I remember many years ago watching a Dr. Who episode where a very important key was “hidden” in a display of many other keys. Kind of like hiding a tree in a forest. This concept is “security by obscurity”. Generally this is considered a bad approach to security. It is a bad approach if this is the ONLY thing you consider. Many examples are security by obscurity are usually thought of as… proprietary applications that keep source code secret so no one can find what flaws exist, using operating systems or programs that are “obscure” or have small market share and are not targetted.


The first item is obviously one that doesn’t work. How many security vulnerabilities in Windows have been reported from outside Microsoft? I don’t know that there’s an accurate count – point is LOTS. The second one is something I talked about in the last entry. It can help as a part of an overall strategy but shouldn’t be considered the magic bullet. There are some things about the design of Apple and Linux systems that I think discourage the spread of malware if done right, but not every distribution (or user) may “do things right”. Any built in security measure is usually possible to circumvent.

Another angle on security through obscurity is this. Let’s say you decide you DO want to run a webserver on your machine and allow access from the outside world. Let’s say that you don’t want it to be obvious though and decide that instead of the usual port 80, you want it to run on port 8888, then to access it an outsider would have to enter http://yoursiteaddress:8888 The address wouldn’t show up in a typical scan for listening servers on port 80 and it would certainly have less visibility. If it’s configured insecurely though it certainly won’t help protect against someone that discovers it and wants to break in.

So, in certain circumstances, obscuring yourself for security purposes can be useful, but they shouldn’t be relied on as the only way to stay safe.

Related Posts

Blog Traffic Exchange Related Posts
  • Network security - how safe is your network? Looking at ARP A while back I did a network security series and one of the points that I mentioned was that it's important to know what is normal for your network. In other words, what machines are NORMALLY connected, what services are normally running, etc. Well, I'm about to start a serious......
  • Network Security - Arp spoofing series I think I've wrapped up the series on arp spoofing and it's implications for network security. I know there's nothing earth shattering here, most network security types are well aware of the problems (and perhaps aware of more sophisticated solutions?). For some though, this series is likely an eye opener......
  • Network Security - Arp spoofing So.... what is arp spoofing (poisoning).... and what are it's implications? ARP spoofing involves tricking a machine into thinking that you're machine is, yet another. Let's put this in IP address terms. Let's say that 192.168.0.1 is the default gatway on the network and 192.168.0.150 is our target. We are......
Blog Traffic Exchange Related Websites
  • Developing A Daily Schedule To Achieve Goals Recently, Kevin over at No Debt Plan posted about his daily schedule and if it was appropriate for what he wanted to achieve. His excellent post got me thinking about whether or not a more structured daily schedule would allow me to better achieve my goals for 2009. Current Daily......
  • Life Insurance Strategies for Baby Boomers Many baby boomers have been paying for one or more life insurance policies for most of their adult lives.  As children grow up and move out, the need for life insurance diminishes.  Even an otherwise dependent spouse may not need as much or any life insurance protection.  Instead, accumulated retirement......
  • Where Should You Keep Your Emergency Fund? Editor's Note: This is a guest post from Debbie Dragon.. Taking control of your finances begins with having access to an emergency fund. People who have adequate money in an emergency fund aren't forced to turn to credit cards when an unexpected expense pops up. The typical rule of thumb,......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Leave a Reply

You must be logged in to post a comment.


Switch to our mobile site