Storage channels are used by attackers to encode the information getting transferred and then decode it later. In TCP/IP stacks, some fields are left vacant or unused. Attackers utilize these unused fields as storage channels.
Two types of covert channels: covert storage and covert timing.
• A covert storage channel is used when one process writes data to a hard drive and another process reads it. In a covert storage attack, a higher-level subject writes data to a storage area and a lower subject reads it. In a covert storage channel, security risks arise due to the storage location.
• A covert timing channel is used when a process transmits data to another process. Covert timing channels convey information by modifying the timing of a system resource in some measurable way.
According to the official study guide, there are only two types of covert channels: timing and storage. Since the question is about a covert channel TYPE, the only valid response is "storage" (C). All other options are not a covert channel types and thus are incorrect. While a pipe can be used as a communication mechanism between processes, it is not a covert channel type in the context of computer security. Therefore, the only valid response to this question is "storage" (C), as it is the only option that represents a covert channel type.
A covert channel is a way for unauthorized information to be transferred between two entities that are not supposed to be able to communicate with each other. There are two main types of covert channels: storage channels and timing channels.
Storage channels use shared storage space, such as a hard drive, to transfer information. For example, an attacker could create a hidden file on the hard drive and then modify the file to encode the information they want to transfer.
Timing channels use the timing of system events to transfer information. For example, an attacker could measure the time it takes for a system to perform a certain task and then use that information to transfer data.
It is C, as storage, timing-based, and behavior are the three types of covert channels:
https://medium.com/insa-tc/covert-channels-in-computer-networks-26a33fd911b2
will go with C
Storage-based covert channels. This involves hiding data in some unexpected portion of the message
Timing-based covert channels. Time is a parameter, it was used in morse code, so why not use it in packet based networks to create a covert channel
A.Pipe
A pipe is a type of covert channel that can be used to transfer information between two processes in a way that is not easily detectable by system administrators or security personnel. Covert channels are communication channels that are not intended to be used for information transfer, but can still be used to transfer information due to weaknesses or limitations in the system security mechanisms. Pipes are a common type of covert channel that can be used to transfer information between two processes on the same system by writing to and reading from a shared pipe file.
B. Memory
A covert channel is a type of communication channel that allows two processes to communicate in a way that is not intended or visible to an observer. Memory is one example of a covert channel, as two processes can share information by writing to and reading from shared memory, without the observer being aware of it. Other examples of covert channels include timing channels, where two processes communicate by modulating the time of certain events, and storage channels, where they communicate by writing and reading data to and from shared storage devices.
The existence of a covert storage channel in a communications channel may release information which can be of significant use to attackers.
https://owasp.org/www-community/vulnerabilities/Covert_storage_channel
D because all the other ones follow strict rules for manipulating data. Creating a covert channel using monitoring must be very smart. I never actually heard about it before, but now that I know about it, sounds very tricky and smart.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
[Removed]
Highly Voted 2 years, 2 months agojackdryan
1 year, 6 months ago[Removed]
Highly Voted 2 years, 2 months agosbear123
Most Recent 8 months, 1 week agoSoleandheel
11 months, 2 weeks agoisaac592
1 year, 1 month ago74gjd_37
1 year, 2 months agoBoZT
1 year, 2 months agoHughJassole
1 year, 5 months agoNJALPHA
1 year, 7 months agoRollingalx
1 year, 9 months agoDee83
1 year, 10 months agoDJOEK
1 year, 10 months agocobbs
1 year, 11 months agoabb77
2 years agordy4u
2 years agojsnow2258
2 years, 1 month agoOppenheimer
2 years, 1 month ago