Network Security guide for the home or small business network – Part 15 – Security Through obscurity



I remember many years ago watching a Dr. Who episode where a very important key was “hidden” in a display of many other keys. Kind of like hiding a tree in a forest. This concept is “security by obscurity”. Generally this is considered a bad approach to security. It is a bad approach if this is the ONLY thing you consider. Many examples are security by obscurity are usually thought of as… proprietary applications that keep source code secret so no one can find what flaws exist, using operating systems or programs that are “obscure” or have small market share and are not targetted.


The first item is obviously one that doesn’t work. How many security vulnerabilities in Windows have been reported from outside Microsoft? I don’t know that there’s an accurate count – point is LOTS. The second one is something I talked about in the last entry. It can help as a part of an overall strategy but shouldn’t be considered the magic bullet. There are some things about the design of Apple and Linux systems that I think discourage the spread of malware if done right, but not every distribution (or user) may “do things right”. Any built in security measure is usually possible to circumvent.

Another angle on security through obscurity is this. Let’s say you decide you DO want to run a webserver on your machine and allow access from the outside world. Let’s say that you don’t want it to be obvious though and decide that instead of the usual port 80, you want it to run on port 8888, then to access it an outsider would have to enter http://yoursiteaddress:8888 The address wouldn’t show up in a typical scan for listening servers on port 80 and it would certainly have less visibility. If it’s configured insecurely though it certainly won’t help protect against someone that discovers it and wants to break in.

So, in certain circumstances, obscuring yourself for security purposes can be useful, but they shouldn’t be relied on as the only way to stay safe.

Related Posts

Blog Traffic Exchange Related Posts
  • Network Security - Arp spoofing series I think I've wrapped up the series on arp spoofing and it's implications for network security. I know there's nothing earth shattering here, most network security types are well aware of the problems (and perhaps aware of more sophisticated solutions?). For some though, this series is likely an eye opener......
  • Network Security guide for the home or small business network - Part 6 - Secure your services This one is going to be tougher. Of what we've looked at so far this will probably take more work and learning than any of the others. The good news is, depending on your situation you may need to do less here. IF you have decided that your pc (or......
  • Beware: Wolves in sheeps clothing found on different sites (security scams) This is another "wolf in sheeps clothing" alert. The Sunbelt blog has information and tips on a number of other sites that are posing as either the Windows security center page, or a page not found error. The windows security center spoof once again claims the following "Attention! Your system......
Blog Traffic Exchange Related Websites
  • Is Man naturally evil? Is Man naturally evil: What is evil: People generally have a difficult time defining "evil." Often, they are reduced to giving examples such as rape and genocide. Others believe "evil" is, at best arbitrary, and more likely imaginary. However, when we see evil in an amplified state, regardless of our......
  • Reviewing My Social Security Statement in a Time of Economic Insecurity Yesterday Mr. ToughMoneyLove received his annual Social Security Statement, including earnings history and the estimate of retirement benefits.  It actually made me feel more secure in this time of economic upheaval.  Skeptical?  Read on.  My Social Security Statement is Actually Helpful  Many of my recent posts have been harshly critical......
  • Collecting Money World Wide There are several money collectors here in the United States and around the globe. There are even some people who make special trips to other parts of the world just for the purpose of collecting currencies for their personal collections. Many people go to some of the events and trade......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Leave a Reply

You must be logged in to post a comment.


Switch to our mobile site