In computer security, a covert channel is a type of computer security attack that creates a capability to transfer information objects between processes that are not supposed to be allowed to communicate by the computer security policy. The term, originated in 1973 by Lampson is defined as "(channels) not intended for information transfer at all, such as the service program's effect on system load." to distinguish it from Legitimate channels that are subjected to access controls by COMPUSEC.
Read more about Covert Channel: Characteristics, Identifying Covert Channels, Eliminating Covert Channels, Data Hiding in OSI Model, Data Hiding in LAN Environment By Covert Channels, Data Hiding in TCP/IP Protocol Suite By Covert Channels
Famous quotes containing the words covert and/or channel:
“There was the murdered corpse, in covert laid,
And violent death in thousand shapes displayed;
The city to the soldiers rage resigned;
Successless wars, and poverty behind;
Ships burnt in fight, or forced on rocky shores,
And the rash hunter strangled by the boars;
The newborn babe by nurses overlaid;
And the cook caught within the raging fire he made.”
—Geoffrey Chaucer (1340?1400)
“Eddie did not die. He is no longer on Channel 4, and our sets are tuned to Channel 4; hes on Channel 7, but hes still broadcasting. Physical incarnation is highly overrated; it is one corner of universal possibility.”
—Marianne Williamson (b. 1953)