Network Security
隐蔽通道检测
The identification and monitoring of unauthorized communication channels that exploit legitimate network protocols or resources to leak information. Referenced in NIST SP 800-53 (SC-7(19)), ISO/IEC 27002:2022, and CIS Controls v8.
Quick answer: The identification and monitoring of unauthorized communication channels that exploit legitimate network protocols or resources to leak information. Referenced in NIST SP 800-53 (SC-7(19)), ISO/IEC 27002:2022, and CIS Controls v8.
This term page is part of the Protermify Cybersecurity glossary and is published as static HTML for fast indexing and clear language coverage.