Exploitable Channel

February 21, 2018

How Can We Help?

Exploitable Channel

You are here:
< Back

Channel that allows the violation of the security policy governing an information system and is usable or detectable by subjects external to the trusted computing base. See Covert Channel.
SOURCE: CNSSI-4009