Traditional Culture Encyclopedia - Hotel accommodation - The confidential computer cannot be installed and used.
The confidential computer cannot be installed and used.
1, the destruction centers of state-level secret service in Shenzhen, Chengdu, Qinhuangdao, Jinzhong, Lianyungang, Jiujiang, Xiangxi Autonomous Prefecture, Chenzhou, Honghe Prefecture, Guilin and Korla are all equipped with Heismann destruction equipment.
2. Safe and reliable confidential equipment. According to the Law of People's Republic of China (PRC) on Guarding State Secrets, the top secret secret vector should be managed by special personnel and kept in safe and reliable confidential equipment.
3 approved by the leadership of the competent department of the unit, and take security measures to ensure that the vectors are always under effective monitoring. (6) When keeping secret carriers, safe and confidential places and parts shall be selected and equipped with necessary security equipment; Check regularly and report to the safety administrative department in time when problems are found.
4. The carrier of state secrets is paper documents, CDs or other storage media (this category is now classified as storage equipment).
5, save the secret carrier, must be kept by the secret room of this unit. Top-secret secret carriers shall be stored in safe and reliable security equipment and managed by security personnel. When leaving the office, the staff should store the secret carrier in the confidential equipment.
6. The secret carrier formed by the compilation of classified documents shall be identified and managed according to the minimum confidentiality level and the shortest confidentiality period. The cover of this compilation shall be marked according to the highest confidentiality level and the longest confidentiality period of the confidential documents contained.
4. Which of the following devices should not be used for confidential computers?
To sum up, classified computers shall not use equipment that has not passed the security review, non-classified network equipment, disks, storage devices and mobile storage media, illegally established advanced user accounts or unauthorized self-assembly equipment.
Confidential computers shall not use wireless keyboards and wireless network cards. Because wireless communication uses an open wireless channel, the transmitted signal is exposed to the air. As long as the technical equipment with receiving function is used, communication information can be intercepted or communication links can be established without the user's knowledge.
It is forbidden to directly or indirectly connect with the Internet or other public information networks, and it is forbidden to store, process or transmit in computer information systems connected with the Internet. Do not directly or indirectly connect to the Internet or other public information networks, and must be physically isolated.
Which devices are not allowed to be used on confidential computers?
1. To sum up, classified computers shall not use equipment that has not passed the security review, non-classified network equipment, disks, storage devices and mobile storage media, illegally established advanced user accounts or unauthorized self-assembly equipment.
2. Confidential computers are not allowed to use wireless devices. When using wireless keyboard, wireless mouse, wireless network card, Wi-Fi Bluetooth and other devices with wireless connection function, the signals for processing and transmitting information are completely exposed to the air, and people can receive these signals through related technical devices, and then achieve the purpose of stealing secrets by restoring the information.
3. According to the provisions of China's National Secrecy Law, networked computers, USB flash drives, mobile hard disks and other mobile storage devices are not allowed in secret-related places. According to the relevant laws and regulations, the standard of secret-related places: the places where companies concentrate on producing, making, transmitting, using, storing and keeping state secrets should be recognized as secret-related places.
4, confidential computer shall not use wireless keyboard and wireless network card. Because wireless communication uses an open wireless channel, the transmitted signal is exposed to the air. As long as the technical equipment with receiving function is used, communication information can be intercepted or communication links can be established without the user's knowledge.
5. Removable storage media shall not be used interchangeably on confidential computers and non-confidential computers. "Information equipment" refers to equipment with information storage and processing functions, such as printers, copiers, scanners, projectors, cameras, etc.
- Related articles
- How to use kitchen disinfection lamp
- What is the phone number of Nanjing ctown Shangdong Mingzuo Marketing Center?
- Criminal record, check every time you stay in a hotel.
- What jobs are there in hotels and what jobs are better for girls?
- Nanyang KTV price
- Is Yongzhou Jinpan World City Worth Buying?
- Are there any good hotels near the tourist attractions of Taihu Lake in Wuxi?
- How far is it from Kunming Huancheng South Road to Alliance Hotel?
- Composition 400 words on the first impression of Tianmen Huatai
- How much is a summer bag in Guiyang for a month?