If deployed as part of a larger IT defensive strategy it's objective is to discourage (NOT prevent) successful attacks.
The link below presents a classic example of Security through obscurity ...
Port spoofing is NOT a panacea. It is simply a tactic that is part of a larger toolkit (see... Intrusion detection system ).
Philosopher Mode: "On"
Here are a few ways to look @ defensive tactics...
"Appearance" in this case means an IT... Black hole .
"Cunning" in this this case suggests if the intruder's attacks are clever... the system defenses should be too.
"Impossible" in this case simply means... to have a IT contingency plan that is muscular enough to discourage (NOT stop) even the most brazen attacker.
There is a prevailing mindset some have that... IT "security" (or any kind) is some sort of magic wand.
In reality... "security" is a mosaic of defensive tactics employed to address (NOT prevent) disaster.
In "security" there are NO guarantees only tactics... (eg. Chess tactic ) Chess is used
as an example because AI ("gaming") forms the basis of modern warfare technology.
Posted by 126.96.36.199 via http://webwarper.net
This is added while posting a message to avoid misusing the service