Covert channel analysis: Difference between revisions
Appearance
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
||
(No difference)
| |||
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
||
(No difference)
| |||
Analysis of the ability of an insider to exfiltrate data based on the design of a security device.
Source: NIST | Category: