Forms of data hiding include keeping a database from being accessed by unauthorized visitors and restricting a subject at a lower classification level from accessing data at a higher classification level.
- Chapter 1 Security Governance Through Principles and Policies
- from CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 7th Edition
- Publisher: Sybex
- Released: September 2015
Use as example of data hiding.
Share this highlighthttp://www.safaribooksonline.com/a/cissp-isc2-certified/11077379/