Give an example of the false sense of security that can come from using the "security by obscurity" approach
What will be an ideal response?
There are many examples. One possibility would be to use a weak encryption
algorithm, like the Caesar cipher and try to keep secret the type of algorithm that you
are using, in addition to keeping the key secret. The problem with this approach is that
if someone guesses you are using such an algorithm or is able to reverse engineering your
software, then they will discover your algorithm. From there it is a simple matter to break
your weak encryption scheme.
You might also like to view...
Plaintext is recovered from the ciphertext using the paired key and _____________ .
A. a digital signature B. a recovery encryption C. a decryption algorithm D. an encryption algorithm
Set methods are also commonly called ________ methods and get methods are also commonly called ________ methods.
a. query, mutator. b. accessor, mutator. c. mutator, accessor. d. query, accessor.