1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bess [88]
4 years ago
5

Open design would seem to favor the attacker, because it certainly opens the implementation and perhaps also the design for the

attacker to study. Justify that open design overrides this seeming advantage and actually leads to solid security.
Computers and Technology
1 answer:
Naddika [18.5K]4 years ago
4 0

Answer:

Explanation:

Open  design  allows  for  much  closer  inspection  of  the  security  system—more  awareness  of  the  security  practices  in  place  is  more  likely  to  reveal  vulnerabilities  to  enable  resolving  those  vulnerabilities  rather  than  their  exploitation.  Obscurity  is  an  insufficient  security  mechanism,  open  design  allows  a  more  thorough  inspection,  and  knowing  that  a  design  will  be  open  should  make  designers  more  careful

You might be interested in
Which of these is NOT a core principle of open source software, based on the Open-­‐Source Initiative’s definitions? (a) The pro
beks73 [17]

The license must allow people to experiment with and redistribute modifications.

Answer: Option B.

<u>Explanation:</u>

In the understanding of the FSF, open-source license criteria center around the accessibility of the source code and the capacity to alter and share it, while free programming licenses centers around the client's opportunity to utilize the program, to adjust it, and to share it.

Flexibility and agility, speed, cost effectiveness, ability to start small, great information security are some of the great properties and characteristics of the open source software.

8 0
3 years ago
A mobile device has stopped receiving automatic OS updates that until recently were pushed to the device.
Phantasy [73]
C. Cloud storage failure (but prob not failure just full)
7 0
3 years ago
Read 2 more answers
A term used in security to refer to forging or disguising the origin or identity of an email transmission so that it seems to co
Alex777 [14]
The answer to this is spoof! glad i could help :)
4 0
3 years ago
Who is the first man to find biology​
Softa [21]

Answer:

Thomas Beddoes

Explanation:

8 0
3 years ago
Read 2 more answers
By default, after how much time has elapsed in an active dhcp lease will a windows client computer attempt to renew the lease?
Y_Kistochka [10]
By default, the amount of time that should pass in an active DHCP lease that will allow a window client computer attempt to renew the lease should be at least 50% OF THE LEASE TIME. Once this is achieved, then renewal of the lease is possible. Hope this helps.
4 0
3 years ago
Other questions:
  • As computers become faster, memory access speeds are not keeping pace. Question 5 options: True False
    7·1 answer
  • Explain where and why metallic material or non metallic material have been used in your home​
    8·1 answer
  • Though it is seen as a last resort bankruptcy allows a consumer to
    6·1 answer
  • All of the following are aspects of the search process except
    15·1 answer
  • In a car crash, wearing a seat belt __________________.
    5·2 answers
  • Which of these is an online presentation tool?
    9·2 answers
  • "Why learning how to type is so important.
    7·1 answer
  • The options are file protection , fault-tolerance , fault line , file tolerance , and the question is which term describes the d
    6·1 answer
  • 1. Write programming code in C++ for school-based grading system. The program should accept the Subject and the number of studen
    8·1 answer
  • What is it called when a programmer includes a step in an algorithm that lets
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!