Information leakage happens whenever a system that is designed to be confidential to an eavesdropper reveals some information to unauthorized parties nonetheless.

For example, when designing an Encrypted instant messaging network, a network engineer without the capacity to crack Encryption codes can be an Observer when messages are transmitted, even if he could not read them.

Information Leakage typically leads to the ability to Predict some outcome to a relative high degree and create some an Exploit of the Protocol or the Encryption.

Credential Leakage is when the actual Credential is acquired by an Observer

More Information#

There might be more information for this subject on one of the following:

Add new attachment

Only authorized users are allowed to upload new attachments.
« This page (revision-4) was last changed on 28-Jun-2017 09:27 by jim