| ← Older revision | Revision as of 06:57, 28 August 2011 |
| Line 10: | Line 10: |
| | #{{context|security|computing}} Relying on an [[adversary]]'s lack of [[knowledge]] to provide [[security]]. | | #{{context|security|computing}} Relying on an [[adversary]]'s lack of [[knowledge]] to provide [[security]]. |
| | #*{{quote-book|1990||title=The Evolution of turnin A Classroom Oriented File Exchange Service|author=W Cattey|publisher=USENIX Summer Conference | | #*{{quote-book|1990||title=The Evolution of turnin A Classroom Oriented File Exchange Service|author=W Cattey|publisher=USENIX Summer Conference |
| - | |passage=This security through obscurity proved adequate for our prototype, ut it was unacceptable for a ''turnin'' service in wide use.}} | + | |passage=This security through obscurity proved adequate for our prototype, but it was unacceptable for a ''turnin'' service in wide use.}} |
| | #*{{quote-book|2006|title=Information Security Management Handbook|author=Harold F. Tipton, Micki Krause | | #*{{quote-book|2006|title=Information Security Management Handbook|author=Harold F. Tipton, Micki Krause |
| | |passage=According to '''security-through-obscurity''' advocates, if we carefully hide our gaping vulnerabilities from our enemies, the bad guys will give up in frustration when they cannot easily find holes.}} | | |passage=According to '''security-through-obscurity''' advocates, if we carefully hide our gaping vulnerabilities from our enemies, the bad guys will give up in frustration when they cannot easily find holes.}} |