See security through obscurity on Wiktionary
{ "antonyms": [ { "alt": "in cryptography", "word": "Kerckhoffs's principle" }, { "word": "security by design" } ], "head_templates": [ { "args": { "1": "en", "2": "phrase" }, "expansion": "security through obscurity", "name": "head" } ], "lang": "English", "lang_code": "en", "pos": "phrase", "senses": [ { "categories": [ { "kind": "other", "name": "English entries with incorrect language header", "parents": [ "Entries with incorrect language header", "Entry maintenance" ], "source": "w" }, { "kind": "other", "name": "Pages with 1 entry", "parents": [], "source": "w" }, { "kind": "other", "name": "Pages with entries", "parents": [], "source": "w" }, { "kind": "topical", "langcode": "en", "name": "Computer security", "orig": "en:Computer security", "parents": [ "Computing", "Technology", "All topics", "Fundamental" ], "source": "w" } ], "examples": [ { "ref": "1990, W Cattey, The Evolution of turnin A Classroom Oriented File Exchange Service, USENIX Summer Conference:", "text": "This security through obscurity proved adequate for our prototype, but it was unacceptable for a turnin service in wide use.", "type": "quote" }, { "ref": "2006, Harold F. Tipton, Micki Krause, Information Security Management Handbook:", "text": "According to security-through-obscurity advocates, if we carefully hide our gaping vulnerabilities from our enemies, the bad guys will give up in frustration when they cannot easily find holes.", "type": "quote" }, { "ref": "2008, Shon Harris, CISSP All-in-One Exam Guide:", "text": "Things such as security through obscurity become common practices that usually have damaging results.", "type": "quote" } ], "glosses": [ "The habit or practice of relying on a potential attacker's lack of knowledge will maintain security." ], "id": "en-security_through_obscurity-en-phrase-PfZ0-h23", "links": [ [ "computer security", "computer security" ], [ "habit", "habit" ], [ "practice", "practice" ], [ "rely", "rely" ], [ "potential", "potential" ], [ "attacker", "attacker" ], [ "knowledge", "knowledge" ], [ "maintain", "maintain" ], [ "security", "security" ] ], "qualifier": "computer security", "raw_glosses": [ "(computer security) The habit or practice of relying on a potential attacker's lack of knowledge will maintain security." ], "related": [ { "word": "steganography" } ], "synonyms": [ { "word": "security by obscurity" }, { "word": "security-by-obscurity" }, { "word": "security-through-obscurity" } ] } ], "word": "security through obscurity" }
{ "antonyms": [ { "alt": "in cryptography", "word": "Kerckhoffs's principle" }, { "word": "security by design" } ], "head_templates": [ { "args": { "1": "en", "2": "phrase" }, "expansion": "security through obscurity", "name": "head" } ], "lang": "English", "lang_code": "en", "pos": "phrase", "related": [ { "word": "steganography" } ], "senses": [ { "categories": [ "English entries with incorrect language header", "English lemmas", "English multiword terms", "English phrases", "English terms with quotations", "Pages with 1 entry", "Pages with entries", "en:Computer security" ], "examples": [ { "ref": "1990, W Cattey, The Evolution of turnin A Classroom Oriented File Exchange Service, USENIX Summer Conference:", "text": "This security through obscurity proved adequate for our prototype, but it was unacceptable for a turnin service in wide use.", "type": "quote" }, { "ref": "2006, Harold F. Tipton, Micki Krause, Information Security Management Handbook:", "text": "According to security-through-obscurity advocates, if we carefully hide our gaping vulnerabilities from our enemies, the bad guys will give up in frustration when they cannot easily find holes.", "type": "quote" }, { "ref": "2008, Shon Harris, CISSP All-in-One Exam Guide:", "text": "Things such as security through obscurity become common practices that usually have damaging results.", "type": "quote" } ], "glosses": [ "The habit or practice of relying on a potential attacker's lack of knowledge will maintain security." ], "links": [ [ "computer security", "computer security" ], [ "habit", "habit" ], [ "practice", "practice" ], [ "rely", "rely" ], [ "potential", "potential" ], [ "attacker", "attacker" ], [ "knowledge", "knowledge" ], [ "maintain", "maintain" ], [ "security", "security" ] ], "qualifier": "computer security", "raw_glosses": [ "(computer security) The habit or practice of relying on a potential attacker's lack of knowledge will maintain security." ] } ], "synonyms": [ { "word": "security by obscurity" }, { "word": "security-by-obscurity" }, { "word": "security-through-obscurity" } ], "word": "security through obscurity" }
Download raw JSONL data for security through obscurity meaning in All languages combined (2.0kB)
This page is a part of the kaikki.org machine-readable All languages combined dictionary. This dictionary is based on structured data extracted on 2024-12-21 from the enwiktionary dump dated 2024-12-04 using wiktextract (d8cb2f3 and 4e554ae). The data shown on this site has been post-processed and various details (e.g., extra categories) removed, some information disambiguated, and additional data merged from other sources. See the raw data download page for the unprocessed wiktextract data.
If you use this data in academic research, please cite Tatu Ylonen: Wiktextract: Wiktionary as Machine-Readable Structured Data, Proceedings of the 13th Conference on Language Resources and Evaluation (LREC), pp. 1317-1325, Marseille, 20-25 June 2022. Linking to the relevant page(s) under https://kaikki.org would also be greatly appreciated.