First page Back Continue Last page Summary Graphic
Exfiltration methods
Exfiltration depends on placement
Exfiltration depends on covert/overt nature
Exfiltration bandwidth can be a key issue
The mix of analysis and filtering technologies and location greatly affect exfiltration
The need to encrypt/compress for exfiltration
The desire for a different word
exfiltration?
Notes: