See security through obscurity in All languages combined, or Wiktionary
{ "antonyms": [ { "alt": "in cryptography", "word": "Kerckhoffs's principle" }, { "word": "security by design" } ], "head_templates": [ { "args": { "1": "en", "2": "phrase" }, "expansion": "security through obscurity", "name": "head" } ], "lang": "English", "lang_code": "en", "pos": "phrase", "senses": [ { "categories": [ { "kind": "other", "name": "English entries with incorrect language header", "parents": [ "Entries with incorrect language header", "Entry maintenance" ], "source": "w" }, { "kind": "other", "name": "Pages with 1 entry", "parents": [], "source": "w" }, { "kind": "other", "name": "Pages with entries", "parents": [], "source": "w" }, { "kind": "topical", "langcode": "en", "name": "Computer security", "orig": "en:Computer security", "parents": [ "Computing", "Technology", "All topics", "Fundamental" ], "source": "w" } ], "examples": [ { "ref": "1990, W Cattey, The Evolution of turnin A Classroom Oriented File Exchange Service, USENIX Summer Conference:", "text": "This security through obscurity proved adequate for our prototype, but it was unacceptable for a turnin service in wide use.", "type": "quote" }, { "ref": "2006, Harold F. Tipton, Micki Krause, Information Security Management Handbook:", "text": "According to security-through-obscurity advocates, if we carefully hide our gaping vulnerabilities from our enemies, the bad guys will give up in frustration when they cannot easily find holes.", "type": "quote" }, { "ref": "2008, Shon Harris, CISSP All-in-One Exam Guide:", "text": "Things such as security through obscurity become common practices that usually have damaging results.", "type": "quote" } ], "glosses": [ "The habit or practice of relying on a potential attacker's lack of knowledge will maintain security." ], "id": "en-security_through_obscurity-en-phrase-PfZ0-h23", "links": [ [ "computer security", "computer security" ], [ "habit", "habit" ], [ "practice", "practice" ], [ "rely", "rely" ], [ "potential", "potential" ], [ "attacker", "attacker" ], [ "knowledge", "knowledge" ], [ "maintain", "maintain" ], [ "security", "security" ] ], "qualifier": "computer security", "raw_glosses": [ "(computer security) The habit or practice of relying on a potential attacker's lack of knowledge will maintain security." ], "related": [ { "word": "steganography" } ], "synonyms": [ { "word": "security by obscurity" }, { "word": "security-by-obscurity" }, { "word": "security-through-obscurity" } ] } ], "word": "security through obscurity" }
{ "antonyms": [ { "alt": "in cryptography", "word": "Kerckhoffs's principle" }, { "word": "security by design" } ], "head_templates": [ { "args": { "1": "en", "2": "phrase" }, "expansion": "security through obscurity", "name": "head" } ], "lang": "English", "lang_code": "en", "pos": "phrase", "related": [ { "word": "steganography" } ], "senses": [ { "categories": [ "English entries with incorrect language header", "English lemmas", "English multiword terms", "English phrases", "English terms with quotations", "Pages with 1 entry", "Pages with entries", "en:Computer security" ], "examples": [ { "ref": "1990, W Cattey, The Evolution of turnin A Classroom Oriented File Exchange Service, USENIX Summer Conference:", "text": "This security through obscurity proved adequate for our prototype, but it was unacceptable for a turnin service in wide use.", "type": "quote" }, { "ref": "2006, Harold F. Tipton, Micki Krause, Information Security Management Handbook:", "text": "According to security-through-obscurity advocates, if we carefully hide our gaping vulnerabilities from our enemies, the bad guys will give up in frustration when they cannot easily find holes.", "type": "quote" }, { "ref": "2008, Shon Harris, CISSP All-in-One Exam Guide:", "text": "Things such as security through obscurity become common practices that usually have damaging results.", "type": "quote" } ], "glosses": [ "The habit or practice of relying on a potential attacker's lack of knowledge will maintain security." ], "links": [ [ "computer security", "computer security" ], [ "habit", "habit" ], [ "practice", "practice" ], [ "rely", "rely" ], [ "potential", "potential" ], [ "attacker", "attacker" ], [ "knowledge", "knowledge" ], [ "maintain", "maintain" ], [ "security", "security" ] ], "qualifier": "computer security", "raw_glosses": [ "(computer security) The habit or practice of relying on a potential attacker's lack of knowledge will maintain security." ] } ], "synonyms": [ { "word": "security by obscurity" }, { "word": "security-by-obscurity" }, { "word": "security-through-obscurity" } ], "word": "security through obscurity" }
Download raw JSONL data for security through obscurity meaning in English (2.0kB)
This page is a part of the kaikki.org machine-readable English dictionary. This dictionary is based on structured data extracted on 2024-11-06 from the enwiktionary dump dated 2024-10-02 using wiktextract (fbeafe8 and 7f03c9b). The data shown on this site has been post-processed and various details (e.g., extra categories) removed, some information disambiguated, and additional data merged from other sources. See the raw data download page for the unprocessed wiktextract data.
If you use this data in academic research, please cite Tatu Ylonen: Wiktextract: Wiktionary as Machine-Readable Structured Data, Proceedings of the 13th Conference on Language Resources and Evaluation (LREC), pp. 1317-1325, Marseille, 20-25 June 2022. Linking to the relevant page(s) under https://kaikki.org would also be greatly appreciated.