Network Security guide for the home or small business network – Part 15 – Security Through obscurity



I remember many years ago watching a Dr. Who episode where a very important key was “hidden” in a display of many other keys. Kind of like hiding a tree in a forest. This concept is “security by obscurity”. Generally this is considered a bad approach to security. It is a bad approach if this is the ONLY thing you consider. Many examples are security by obscurity are usually thought of as… proprietary applications that keep source code secret so no one can find what flaws exist, using operating systems or programs that are “obscure” or have small market share and are not targetted.


The first item is obviously one that doesn’t work. How many security vulnerabilities in Windows have been reported from outside Microsoft? I don’t know that there’s an accurate count – point is LOTS. The second one is something I talked about in the last entry. It can help as a part of an overall strategy but shouldn’t be considered the magic bullet. There are some things about the design of Apple and Linux systems that I think discourage the spread of malware if done right, but not every distribution (or user) may “do things right”. Any built in security measure is usually possible to circumvent.

Another angle on security through obscurity is this. Let’s say you decide you DO want to run a webserver on your machine and allow access from the outside world. Let’s say that you don’t want it to be obvious though and decide that instead of the usual port 80, you want it to run on port 8888, then to access it an outsider would have to enter http://yoursiteaddress:8888 The address wouldn’t show up in a typical scan for listening servers on port 80 and it would certainly have less visibility. If it’s configured insecurely though it certainly won’t help protect against someone that discovers it and wants to break in.

So, in certain circumstances, obscuring yourself for security purposes can be useful, but they shouldn’t be relied on as the only way to stay safe.

Related Posts

Blog Traffic Exchange Related Posts
  • Network Security guide for the home or small business network - Part 6 - Secure your services This one is going to be tougher. Of what we've looked at so far this will probably take more work and learning than any of the others. The good news is, depending on your situation you may need to do less here. IF you have decided that your pc (or......
  • Network Security guide for the home or small business network - Part 2 - A Software Firewall Do I really need a hardware firewall? I'm running XP Service Pack 2 with the built in firewall? (or norton, or zonealarm?) Well, personal firewalls (the name that software firewalls go by) are good for a great many things that hardware firewalls AREN'T. They do have their limitations though and......
  • Common Networking Ports Along the lines of "knowing your network" with the network security guide. Here are some of the most commonly used network ports. There are 65535 ports that can listen for a connection, so this is not a thorough listing. (These are tcp unless noted otherwise.) FTP 21 (file transfer protocol,......
Blog Traffic Exchange Related Websites
  • A Strong Week in Tennis for Champion Players This week, there were a few different kinds of games going on throughout the world. These different matches pitted some of the top ranked players in the world against one another to be able to earn the title. While these smaller tournaments might be dwarfed in the shadow of the......
  • 20 Awesome Free OS Downloads Here's a collection of 20 that are worth checking out. There are plenty more, so if you'd like to add your favorites, share them in the comments! Fedora 10 - One of the few live distros that didn't have any trouble with the hardware on my MSI Wind netbook. My......
  • Frugal Friday Week 18 The eBay edition. When looking for ways to save, one thing to consider is purchasing on eBay. If you don't already have an account, you can still search on the site to see the kind of savings you might find. Of course, you need to first be aware of the......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Leave a Reply

You must be logged in to post a comment.


Switch to our mobile site