A Guide to Understanding Covert Channel Analysis of Trusted Systems
Abstract:
This document provides a set of good practices related to covert channel analysis of systems employed for processing classified and other sensitive information. Its written to help vendors and evaluators understand covert channel analysis requirements. It contains suggestions and recommendations derived from Trusted Computer System Evaluation Criteria TCSEC objectives but which arent required by the TCSEC.
Security Markings
DOCUMENT & CONTEXTUAL SUMMARY
Distribution:
Approved For Public Release
Distribution Statement:
Approved For Public Release; Distribution Is Unlimited.
RECORD
Collection: TR