Open design would seem to favor the attacker, because it certainly opens the implementation and perhaps also the design for the attacker to study. Justify that open design overrides this seeming advantage and actually leads to solid security
What will be an ideal response?
Open
design
allows
for
much
closer
inspection
of
the
security
system—more
awareness
of
the
security
practices
in
place
is
more
likely
to
reveal
vulnerabilities
to
enable
resolving
those
vulnerabilities
rather
than
their
exploitation.
Obscurity
is
an
insufficient
security
mechanism,
open
design
allows
a
more
thorough
inspection,
and
knowing
that
a
design
will
be
open
should
make
designers
more
careful.
You might also like to view...
________ occur when a website downloads harmful software onto your computer
Fill in the blank(s) with correct word
What is not true about a report?
A) It can be previewed before it is printed. B) Its record sources include one of more tables or a query. C) It is designed to display only one record at a time. D) It can be sorted independently of its data source.