The product truncates the display, recording, or processing of security-relevant information in a way that can obscure the source or nature of an attack.
Impact: Hide Activities
The source of an attack will be difficult or impossible to determine. This can allow attacks to the system to continue without notice.