Data Exfiltration Techniques and Covert Channels