4.2.6 Assessment tools and analysis of other channels of information leakage