Is it really bad to increase security by 'hiding the system'?



'

Security by Obscurity ', which enhances security by concealing the structure of systems and algorithms, is said to be unable to ensure essential security in modern times. However, security expert Utku Şen points out that 'hidden security is underestimated.'

Security by Obscurity is Underrated – Utku Sen --Blog – computer security, programming
https://utkusen.com/blog/security-by-obscurity-is-underrated.html

'Security by concealment', which attempts to increase security by hiding vulnerable systems from attackers, is a security measure that is ineffective in modern times because there is no way to prevent attacks once the system structure leaks to the outside. It has been with. It is believed that the reason why many open source software can guarantee security is that it does not rely on concealment security.

However, Şen points out that 'security by concealment' is not necessarily evil. According to the security community ' OWASP ', the risk of cyber attacks can be calculated by the formula ' risk = opportunity x impact '. Risk can be mitigated if either the 'impact', which is the magnitude of damage caused by an attack, or the 'opportunity', which indicates the possibility of being attacked, can be reduced. To reduce the chances of the two elements in the formula, the security mechanism must be built in layers so that if an attacker passes the first security, it will be caught in the other security.



Şen argues that concealment security is useful as one of the layered security mechanisms. For example, if you are using 'root user with password of' 123456 'through default port 22' for SSH connection to the server, the server is very likely to be

brute force attack. However, by changing the port used from 22 to 64323 and 'hiding' it, it is possible to reduce the chance of being attacked.

In fact, when Mr. Şen conducted a questionnaire on Twitter, 'Do you scan all ports when you check whether the port of the attacked server is open by port scan?', About half of the respondents said 'Default port' It only scans ', and you can see that changing the port can reduce the chances of being attacked by about half.



In addition to the SSH example, hiding the software structure by obfuscating the code or using random variables is effective against attacks. Şen also points out that concealment security is used not only in cybersecurity but also in the real world, as in the case of dozens of dummy cars being prepared for the president's move.



'Hiding security isn't enough on its own, but it acts as a layer of security that can reduce risk at no cost,' said Şen.

in Software,   Security, Posted by darkhorse_log