Which is an unintended communication path that can be used to violate a system security policy.

A(n) _______________ is an unintended communication path that can be used to violate a system security policy.

A(n) _______________ is an unintended communication path that can be used to violate a system security policy.

A.
Covert channel

B.
Integrity axiom

C.
Simple rule violation

D.
Inferred fact

E.
Aggregated data set



Leave a Reply 0

Your email address will not be published. Required fields are marked *