covert channel leakage - ορισμός. Τι είναι το covert channel leakage
Diclib.com
Λεξικό ChatGPT
Εισάγετε μια λέξη ή φράση σε οποιαδήποτε γλώσσα 👆
Γλώσσα:     

Μετάφραση και ανάλυση λέξεων από την τεχνητή νοημοσύνη ChatGPT

Σε αυτήν τη σελίδα μπορείτε να λάβετε μια λεπτομερή ανάλυση μιας λέξης ή μιας φράσης, η οποία δημιουργήθηκε χρησιμοποιώντας το ChatGPT, την καλύτερη τεχνολογία τεχνητής νοημοσύνης μέχρι σήμερα:

  • πώς χρησιμοποιείται η λέξη
  • συχνότητα χρήσης
  • χρησιμοποιείται πιο συχνά στον προφορικό ή γραπτό λόγο
  • επιλογές μετάφρασης λέξεων
  • παραδείγματα χρήσης (πολλές φράσεις με μετάφραση)
  • ετυμολογία

Τι (ποιος) είναι covert channel leakage - ορισμός

TYPE OF COMPUTER SECURITY ATTACK THAT CREATES A CAPABILITY TO TRANSFER INFORMATION OBJECTS BETWEEN PROCESSES THAT ARE NOT SUPPOSED TO BE ALLOWED TO COMMUNICATE
Covert channels; Timing channel; Timing channels

Covert channel         
In computer security, a covert channel is a type of attack that creates a capability to transfer information objects between processes that are not supposed to be allowed to communicate by the computer security policy. The term, originated in 1973 by Butler Lampson, is defined as channels "not intended for information transfer at all, such as the service program's effect on system load," to distinguish it from legitimate channels that are subjected to access controls by COMPUSEC.
Leakage (electronics)         
GRADUAL TRANSFER OF ELECTRICAL ENERGY ACROSS A BOUNDARY NORMALLY VIEWED AS INSULATING
Leakage current; Leakage (semiconductors); Transistor leakage current; Dielectric leakage; Leakage power; Leaking electricity; Leak resistance; Leakage resistance; Leak current
In electronics, leakage is the gradual transfer of electrical energy across a boundary normally viewed as insulating, such as the spontaneous discharge of a charged capacitor, magnetic coupling of a transformer with other components, or flow of current across a transistor in the "off" state or a reverse-polarized diode.
Leakage inductance         
  • Fig. 2 Nonideal transformer circuit diagram
  • Fig. 1 L<sub>P</sub><sup>σ</sup>and L<sub>S</sub><sup>σ</sup> are primary and secondary '''leakage inductances''' expressed in terms of '''inductive coupling coefficient <math>k</math>''' under open-circuited conditions.
  • High leakage transformer
  • loc=p. 4, Fig. 1, Magnetic field due to current in the inner winding
of a core-type transformer; Fig. 2, Magnetic field due to current in the outer winding of Fig. 1}}</ref>
  • loc=p. 602, "Fig. 18-18 In this equivalent circuit of a (nonideal) transformer the elements are physically realizable and the isolationg property of the transformer has been retained."}}</ref>
  • Fig. 3 Nonideal transformer equivalent circuit
  • Fig. 5 Simplified nonideal transformer equivalent circuit
LEAKAGE INDUCTANCE DERIVES FROM THE ELECTRICAL PROPERTY OF AN IMPERFECTLY-COUPLED TRANSFORMER
Leakage flux; Leak inductance; Leakage reactance; Inductive circuit model of transformer
Leakage inductance derives from the electrical property of an imperfectly-coupled transformer whereby each winding behaves as a self-inductance in series with the winding's respective ohmic resistance constant. These four winding constants also interact with the transformer's mutual inductance.

Βικιπαίδεια

Covert channel

In computer security, a covert channel is a type of attack that creates a capability to transfer information objects between processes that are not supposed to be allowed to communicate by the computer security policy. The term, originated in 1973 by Butler Lampson, is defined as channels "not intended for information transfer at all, such as the service program's effect on system load," to distinguish it from legitimate channels that are subjected to access controls by COMPUSEC.