An exploitable channel is a
|“||[c]hannel that allows the violation of the security policy governing an IS and is usable or detectable by subjects external to the trusted computing base.||”|
|“||[a]ny information channel that is usable or detectable by subjects external to the trusted computing base whose purpose is to violate the security policy of the system.||”|
- ↑ CNSSI 4009.
- ↑ Department of Defense, National Computer Security Center, Glossary of Computer Security Terms (NCSC-TG-004, Ver. 1) (Oct. 21, 1988).