Is simply hiding vulnerabilities and other system architecture information a solid method of defense?

Discussion and responses_2_ETC

Subject: Emerging Threats & Countermeasures

Is simply hiding vulnerabilities and other system architecture information a solid method of defense? What methods would you suggest?

1) Discussion Topic (Around 500 to 600 words) need to submit before Wednesday Noon (today is Monday).

2) Select AT LEAST 2 other students’ threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread.

Responses to Other Students: Respond to at least 2 of your fellow classmates with at least a 100-word reply. To help you with your discussion, please consider the following questions:

  • What did you learn from your classmate’s posting?
  • What additional questions do you have after reading the posting?
  • What clarification do you need regarding the posting?
  • What differences or similarities do you see between your posting and other classmates’ postings?

Required Resources

* Amoroso, E. G. (2012). Cyber attacks: protecting national infrastructure. Elsevier.

* Video on Security through Obscurity:https://youtu.be/UnjadBlHC5c

https://s3.us-east-1.amazonaws.com/blackboard.learn.xythos.prod/5a31b16bb2c48/6082882?response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27Chapter%25207%2520recording.mp4&response-content-type=video%2Fmp4&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20191028T190737Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21599&X-Amz-Credential=AKIAIL7WQYDOOHAZJGWQ%2F20191028%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=9f5abd0699f34cc70e1b8e293fe6da956ecaa88523d83765123ee37d0dc0f20a

* PPT for reference

NOTE:

– I need help from tutor regarding how to work on this task, since am new to this, so that i can work for futures assignments with minor tutor help for writing and for making corrections to my work

 

Answer Preview……………..

In response to this, it is true that hiding vulnerabilities cannot be considered as the best method of defense. Apparently, the method can be of great significant especially in time of emergency. However, the method cannot serve as a long term solution since the attackers will take advantage and penetrate to the system and other architecture in the Organization. As such, the hiding vulnerabilities can only be used as a temporary method of defense before other long…………………….

APA 387 words

Share this paper
Open Whatsapp chat
1
Hello;
Can we help you?