×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

Ensuring computer security using security through obscurity

Abstract

Ensuring computer security using security through obscurity

Ganzhur M.A., Ganzhur A.P., Borisenko I.M.

Incoming article date: 23.01.2019

Computer security is one of the key tasks of our time. Attacks on equipment in the network are constantly and leave large damages in the integrity of the data. There are many methods of computer security, one of which is the method of security through obscurity. The article analyzes the actions of system administrators to ensure server security using the “security through obscurity” method.

Keywords: computer security, security through obscurity, cryptography, decoding, setting up web servers