List the limitations on the amount of information leaked per second through a covert channel in a multiaccess computing system.

What will be an ideal response?

The two primary factors that limit the amount of information that can be leaked are the speed at which the retrieving process can recognize that a bit has been posted to the covert channel and the speed at which the sending process can be certain the retrieving process has had time to retrieve a bit. This time is thus the synchronization time between the two processes.

Computer Science & Information Technology

You might also like to view...

The character set used for the alphabet of English characters is called _______.

A. EBCDIC B. HexaDecimal C. ASCII D. JavaScript

Computer Science & Information Technology

It is easier to assign dollar values to intangible than to tangible benefits.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology