A(n) _______________ is an unintended communication path that can be used to violate a system security policy.
Covert channel
Integrity axiom
Simple rule violation
Inferred fact
Aggregated data set
Submit