Give an example of the false sense of security that can come from using the "security by obscurity" approach

What will be an ideal response?

There are many examples. One possibility would be to use a weak encryption
algorithm, like the Caesar cipher and try to keep secret the type of algorithm that you
are using, in addition to keeping the key secret. The problem with this approach is that
if someone guesses you are using such an algorithm or is able to reverse engineering your
software, then they will discover your algorithm. From there it is a simple matter to break
your weak encryption scheme.

Computer Science & Information Technology

You might also like to view...

Plaintext is recovered from the ciphertext using the paired key and _____________ .

A. a digital signature B. a recovery encryption C. a decryption algorithm D. an encryption algorithm

Computer Science & Information Technology

Set methods are also commonly called ________ methods and get methods are also commonly called ________ methods.

a. query, mutator. b. accessor, mutator. c. mutator, accessor. d. query, accessor.

Computer Science & Information Technology