In computer security, a covert channel is a type of computer security attack that creates a capability to transfer information objects between processes that are not supposed to be allowed to communicate by the computer security policy. The term, originated in 1973 by Lampson is defined as "(channels) not intended for information transfer at all, such as the service program's effect on system load." to distinguish it from Legitimate channels that are subjected to access controls by COMPUSEC.
Read more about Covert Channel: Characteristics, Identifying Covert Channels, Eliminating Covert Channels, Data Hiding in OSI Model, Data Hiding in LAN Environment By Covert Channels, Data Hiding in TCP/IP Protocol Suite By Covert Channels
Other articles related to "covert channel, covert channels, covert":
... Rowland simply provides a proof of concept of existence as well as exploitation of covert channels in TCP/IP protocol suite ... However, the non-detectability of these covert communication techniques is questionable ... The Data Hiding in TCP/IP Protocol suit by covert channels have following important aspects Identify the existence of covert channels in a network environment ...
Famous quotes containing the words channel and/or covert:
“The Xanthus or Scamander is not a mere dry channel and bed of a mountain torrent, but fed by the ever-flowing springs of fame ... and I trust that I may be allowed to associate our muddy but much abused Concord River with the most famous in history.”
—Henry David Thoreau (18171862)
“There was the murdered corpse, in covert laid,
And violent death in thousand shapes displayed;
The city to the soldiers rage resigned;
Successless wars, and poverty behind;
Ships burnt in fight, or forced on rocky shores,
And the rash hunter strangled by the boars;
The newborn babe by nurses overlaid;
And the cook caught within the raging fire he made.”
—Geoffrey Chaucer (1340?1400)