
For instance, one can hide version number for Apache servers.

Configuring firewall rules for allowlisting/blocklisting is also a viable solution. A comprehensive solution is to limit the number of requests from an IP address within a defined period and use two-factor authentication. However, as soon as an attacker finds the new port, this measure becomes useless. For decreasing the number of brute force attacks on standard ports, security teams prefer using a different daemon port.
Definition for obscurity code#
So, they hide user passwords within binary code modules or mix them with script comments or code files.

Some of the common examples of STO techniques include: However, with increased sharing of knowledge, the popularity of open systems, better understanding of programming languages, and the availability of average computing power with individuals, its effectiveness has declined over the years. Without a doubt, this approach sounds good in theory.
Definition for obscurity how to#
If an individual does not know how to impact the security of a target system, they do not pose a danger to the system. The core idea of this approach is to run IT systems on a well-defined need-to-know basis. It gives a sense of pseudo-security for IT systems. STO is popular among bureaucratic agencies, whether they are governmental, industrial, or security. In plain words, STO focuses on keeping a system secure by strictly limiting the disclosure of information about the system’s internal mechanisms. This approach enforces secrecy as the primary security measure. It relies on hiding crucial security information from the stakeholders and users. STO, security through obscurity, or security by obscurity, is a well-known approach for securing a system or an application. Definition of security through obscurity (STO) Our vCISOs will ensure your optimal cybersecurity strategy and adequate posture. Our services such as comprehensive gap assessment, red-teaming, penetration testing, threat hunting and vulnerability assessment reveal a company’s vulnerabilities. LIFARS is an industry leader that develops proactive strategies and tactics against evolving cybersecurity threats. This belief has been around for decades, and there are arguments on both the sides of the spectrum: whether security through obscurity is good or not.

The proponents of this belief consider that if the attackers are not aware of security measures employed in a target system, security is better. From the attackers’ perspective, they attempt to gather information about target systems for better planning and executing their attacks.īased on this common understanding of attacker psychology, “security through obscurity” is an existing belief in the information security industry. These measures include applying patches, disabling unnecessary services, and finetuning firewall rules, among others. Security teams implement various measures to achieve this objective and ensure a strong defense against incoming attacks. Keeping an organization’s systems secure is the primary objective of its security team.
