Browse Definitions :
Definition

security through minority

Contributor(s): Matthew Haughn

Security through minority is an approach that relies upon infrequently-used code for its effectiveness. 

The approach is a subcategory of security through obscurity, which depends upon secret or little-known code to provide protection. Security through minority relies on the knowledge that hackers looking for vulnerabilities to exploit typically seek commonly-used software to maximize their sales of malware and hacking scripts and increase the number of computers they can reach.

A related strategy, security through obsolescence, depends on the fact that obsolete software is a less-attractive and more difficult target for an attacker. Security through minority, security through minority and security through obscurity are all deprecated approaches.  The preferred model is security by design, which seeks to make systems as impervious to attack as possible through their conception and development.

This was last updated in July 2015

Continue Reading About security through minority

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

SearchSecurity

  • time-based one-time password (TOTP)

    A time-based one-time password (TOTP) is a temporary code, generated by an algorithm, for use in authenticating access to ...

  • Security Operations Center (SOC)

    A security operations center (SOC) is a command center facility for a team of IT professionals with expertise in information ...

  • incident response team

    An incident response team is a group of IT professionals in charge of preparing for and reacting to any type of organizational ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • NAND flash memory

    NAND flash memory is a type of nonvolatile storage technology that does not require power to retain data.

  • storage class memory (SCM)

    Storage class memory (SCM) is a type of NAND flash that includes a power source to ensure that data won't be lost due to a system...

  • Hadoop as a service (HaaS)

    Hadoop as a service (HaaS), also known as Hadoop in the cloud, is a big data analytics framework that stores and analyzes data in...

Close