covert channel leakage - meaning and definition. What is covert channel leakage
Diclib.com
ChatGPT AI Dictionary
Enter a word or phrase in any language 👆
Language:     

Translation and analysis of words by ChatGPT artificial intelligence

On this page you can get a detailed analysis of a word or phrase, produced by the best artificial intelligence technology to date:

  • how the word is used
  • frequency of use
  • it is used more often in oral or written speech
  • word translation options
  • usage examples (several phrases with translation)
  • etymology

What (who) is covert channel leakage - definition

TYPE OF COMPUTER SECURITY ATTACK THAT CREATES A CAPABILITY TO TRANSFER INFORMATION OBJECTS BETWEEN PROCESSES THAT ARE NOT SUPPOSED TO BE ALLOWED TO COMMUNICATE
Covert channels; Timing channel; Timing channels

Covert channel         
In computer security, a covert channel is a type of attack that creates a capability to transfer information objects between processes that are not supposed to be allowed to communicate by the computer security policy. The term, originated in 1973 by Butler Lampson, is defined as channels "not intended for information transfer at all, such as the service program's effect on system load," to distinguish it from legitimate channels that are subjected to access controls by COMPUSEC.
Leakage (electronics)         
GRADUAL TRANSFER OF ELECTRICAL ENERGY ACROSS A BOUNDARY NORMALLY VIEWED AS INSULATING
Leakage current; Leakage (semiconductors); Transistor leakage current; Dielectric leakage; Leakage power; Leaking electricity; Leak resistance; Leakage resistance; Leak current
In electronics, leakage is the gradual transfer of electrical energy across a boundary normally viewed as insulating, such as the spontaneous discharge of a charged capacitor, magnetic coupling of a transformer with other components, or flow of current across a transistor in the "off" state or a reverse-polarized diode.
Leakage inductance         
  • Fig. 2 Nonideal transformer circuit diagram
  • Fig. 1 L<sub>P</sub><sup>σ</sup>and L<sub>S</sub><sup>σ</sup> are primary and secondary '''leakage inductances''' expressed in terms of '''inductive coupling coefficient <math>k</math>''' under open-circuited conditions.
  • High leakage transformer
  • loc=p. 4, Fig. 1, Magnetic field due to current in the inner winding
of a core-type transformer; Fig. 2, Magnetic field due to current in the outer winding of Fig. 1}}</ref>
  • loc=p. 602, "Fig. 18-18 In this equivalent circuit of a (nonideal) transformer the elements are physically realizable and the isolationg property of the transformer has been retained."}}</ref>
  • Fig. 3 Nonideal transformer equivalent circuit
  • Fig. 5 Simplified nonideal transformer equivalent circuit
LEAKAGE INDUCTANCE DERIVES FROM THE ELECTRICAL PROPERTY OF AN IMPERFECTLY-COUPLED TRANSFORMER
Leakage flux; Leak inductance; Leakage reactance; Inductive circuit model of transformer
Leakage inductance derives from the electrical property of an imperfectly-coupled transformer whereby each winding behaves as a self-inductance in series with the winding's respective ohmic resistance constant. These four winding constants also interact with the transformer's mutual inductance.

Wikipedia

Covert channel

In computer security, a covert channel is a type of attack that creates a capability to transfer information objects between processes that are not supposed to be allowed to communicate by the computer security policy. The term, originated in 1973 by Butler Lampson, is defined as channels "not intended for information transfer at all, such as the service program's effect on system load," to distinguish it from legitimate channels that are subjected to access controls by COMPUSEC.