A(n) _______________ is an unintended communication path that can be used to violate a system security policy.
A.
Covert channel
B.
Integrity axiom
C.
Simple rule violation
D.
Inferred fact
E.
Aggregated data set
A(n) _______________ is an unintended communication path that can be used to violate a system security policy.
A(n) _______________ is an unintended communication path that can be used to violate a system security policy.
A.
Covert channel
B.
Integrity axiom
C.
Simple rule violation
D.
Inferred fact
E.
Aggregated data set