In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-28 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/02 Report--
The editor will share with you what you should pay special attention to when buying secret-related computers. I hope you will get something after reading this article. Let's discuss it together.
The recovery of data stored by secret-related computers and related equipment must be carried out at the "secret-related data recovery qualification unit approved by the state administrative department for secrecy". By using the functions of collection, processing, storage, transmission and retrieval, computers dealing with information related to state secrets are usually called secret-related computers; secret-related computers do not use computer peripherals with wireless interconnection functions.
The recovery of data stored by secret-related computers and related equipment must be carried out at the "secret-related data recovery qualification unit approved by the state administrative department for secrecy".
Extended data:
Using the functions of collection, processing, storage, transmission and retrieval, the computer that deals with information related to state secrets is usually called secret-related computer.
Computers, fax machines, photocopiers and other office automation equipment dealing with secret-related information shall be maintained within the unit under the supervision of special personnel on the site, and maintenance personnel are strictly prohibited from reading or copying secret-related information; if it is really necessary to send out for maintenance, the storage parts of secret-related information shall be removed.
When secret-related information equipment is converted to non-secret-related information equipment or eliminated, the secret-related information storage parts shall be removed.
Secret-related computers shall not use computer peripherals with wireless interconnection functions such as "wireless keyboard, wireless mouse, wireless network card". These devices and computers are connected wirelessly, and the signals for processing and transmitting information are completely exposed in the air, and unrelated personnel can receive these signals through relevant technical equipment and make signal restoration processing. Therefore, secret-related computers cannot use computer peripherals with wireless interconnection functions.
Foreign countries, especially some developed countries, often require their electronic equipment designers and manufacturers, such as computers and encryption machines, to set up "back doors" in their exported computers and equipment in order to facilitate the theft of information from other countries. In addition, some computers have the function of wireless interconnection, and some security performance is not up to standard. If you buy such a computer and use it to deal with secret-related information, it is easy to leave hidden dangers of leakage and information security risks.
When purchasing secret-related computers, special attention should be paid to:
(1) in principle, domestic equipment should be purchased. If you need to buy imported computers and equipment, you should choose and purchase computers and equipment that have been tested, approved and approved by the relevant competent departments of the state.
(2) when buying, you should choose at random and do not book in advance. Once selected, purchase and pick up the goods immediately in case they are set up or installed.
(3) do not buy computers with wireless network cards and wireless interconnection functions. If you have purchased and prepared to process secret-related information, you must remove the hardware module with wireless interconnection function before using it.
(4) before use, the computer shall be tested by the relevant departments for special security technology to confirm that there is no risk of leakage and security risks, and then it will be used to deal with secret-related information.
After reading this article, I believe you have a certain understanding of what you should pay special attention to when choosing secret-related computers. If you want to know more about it, you are welcome to follow the industry information channel. Thank you for your reading!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.