List the limitations on the amount of information leaked per second through a covert channel in a multiaccess computing system

What will be an ideal response?

The
two
primary
factors
that
limit
the
amount
of
information
that
can
be
leaked
are
the
speed
at
which
the
retrieving
process
can
recognize
that
a
bit
has
been
posted
to
the
covert
channel
and
the
speed
at
which
the
sending
process
can
be
certain
the
retrieving
process
has
had
time
to
retrieve
a
bit.
This
time
is
thus
the
synchronization
time
between
the
two
processes.

Computer Science & Information Technology

You might also like to view...

The while loop is a __________ loop.

a. post-test b. pre-test c. infinite d. limited e. None of these

Computer Science & Information Technology

Which groups or users have full control of this folder?

What will be an ideal response?

Computer Science & Information Technology