One of methods of implementing information system security based on concealing the object’s operating principles and structure to encumber attacks. It is assumed that, as long as they lack information about the system’s internal design, the attackers will not get at its vulnerabilities. There are both pros and cons to the principle, so IS professionals recommend using it just as one of the security contour elements.