Course Hero Logo

Order 3802815 1 .edited.docx - Running Head: SECURITY...

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 - 3 out of 4 pages.

Running Head: SECURITY THROUGH OBSCURITY1Security Through ObscurityStudent’s NameInstitutional AffiliationDate
SECURITY THROUGH OBSCURITY2Security Through ObscurityOne of the main tasks of working as a systems administrator is to ensure that all thesystems remain secure. Some of the ways to ensure the systems are secure are through installingfirewalls and IDs, kernel patching, application of system package updates and disablingunnecessary devices, to mention a few (Borges, 2020). Security through obscurity means relianceon secrecy during software development, which minimizes the chance that a weakness can betargeted or detected.One of the advantages of security through obscurity is that the system usually usesabnormal configurations, thereby reducing exploitation and thus obtaining protection. Whenusing the security through obscurity, there is a reduction in the potential of errors in bugs,configurations and other problems. Using security through obscurity is also beneficial since ofthe benefit of the least privilege, which ensures that data that is inbound is secure. In addition,another advantage of using security through obscurity is that there is simplicity. Research has

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 4 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Summer
Professor
N/A

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture