Covert channel analysis: Difference between revisions
Appearance
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
||
| Line 1: | Line 1: | ||
{{LanguageHeader|en}} | {{LanguageHeader|en}} | ||
{{CyberTerm|definition=Analysis of the ability of an insider to exfiltrate data based on the design of a security device.|source=NIST | {{CyberTerm|definition=Analysis of the ability of an insider to exfiltrate data based on the design of a security device.|source=NIST}} | ||