[index] [text page] [<<start] [<prev] [next>] [last>>]
Page 4: Who Uses Covert Channels?

Page 4

  
  Who Uses Covert Channels?
  Cracker who has breached your systems:
  Download tools from outside
  Upload internal data to outside
  Create virtual network to outside machine
  Communicate to outside parties

Copyright 2003, Bri Hatch of Onsight, Inc.

Presented at SecureWorld Expo, 2003.

Presentation created using vim and MagicPoint.