If deployed as part of a larger IT defensive strategy it's objective is to discourage (NOT prevent) successful attacks.
The link below presents a classic example of Security through obscurity ...
http://linuxlookup.com/howto/change_default_ssh_port
Port spoofing is NOT a panacea. It is simply a tactic that is part of a larger toolkit (see... Intrusion detection system ).
Philosopher Mode: "On"
Here are a few ways to look @ defensive tactics...
"Appearance" in this case means an IT... Black hole .- Niccolò Machiavelli ... (" The Prince")
"Every one sees what you appear to be, few really know what you are"
"Cunning" in this this case suggests if the intruder's attacks are clever... the system defenses should be too.- Carl von Clausewitz ... (" On War ")
"Cunning implies secret purpose. . . . It is itself a form of deceit. . . .
No human characteristic appears so suited to the task of directing and inspiring strategy. . . . "
"Impossible" in this case simply means... to have a IT contingency plan that is muscular enough to discourage (NOT stop) even the most brazen attacker.- Yagyū Munenori ... (" A Hereditary Book on the Art of War ")
It is hard to be impossible for others to cut down.
PREFACE:
There is a prevailing mindset some have that... IT "security" (or any kind) is some sort of magic wand.
In reality... "security" is a mosaic of defensive tactics employed to address (NOT prevent) disaster.
In "security" there are NO guarantees only tactics... (eg. Chess tactic ) Chess is used
as an example because AI ("gaming") forms the basis of modern warfare technology.
Posted by 73.112.17.71 via http://webwarper.net
This is added while posting a message to avoid misusing the service