Mechanisms exist to prevent unauthorized and unintended information transfer via shared system resources.