

What kind of protection is implemented for computers that store and process state secrets?
Computers that store and process state secrets are subject to hierarchical protection. Computers that store and process state secrets are subject to hierarchical protection in accordance with the basic requirements for hierarchical protection of national information security and in accordance with the hierarchical protection of confidential information systems of the national confidentiality work department.
The operating environment of this article: Windows 7 system, Dell G3 computer.
What kind of protection is implemented for computers that store and process state secrets?
Computers that store and process state secrets are subject to graded protection.
Confidential information systems are divided into top secret level, confidential level and secret level according to the degree of confidentiality. Agencies and units shall determine the confidentiality level of the system based on the highest level of confidentiality of the information stored and processed by the confidential information system, and adopt corresponding security and confidentiality protection measures in accordance with the hierarchical protection requirements.
Computers that store and process state secrets shall be protected in accordance with the basic requirements of the national information security level protection and the classified information systems of the national security work department.
According to Article 24 of the "Measures for the Administration of Leveled Protection of Information Security", confidential information systems shall be based on the basic requirements of national information security level protection and in accordance with the management regulations of the national confidentiality work department on the hierarchical protection of confidential information systems. and technical standards, and protect them based on the actual situation of the system. Non-confidential information systems shall not handle state secret information, etc.
Extended information:
Article 27 of the "Measures for the Management of Information Security Level Protection" Units with intensive integration qualifications shall be responsible for or participate in the design and implementation of confidential information systems.
Units that construct and use confidential information systems shall design plans and implement hierarchical protection based on the actual requirements of the system in accordance with the hierarchical protection management specifications and technical standards for confidential information systems, and in accordance with the different requirements of secret, confidential and top secret levels. Its protection level is generally not lower than the third, fourth and fifth levels of national information security level protection.
For more related knowledge, please visit the FAQ column!
The above is the detailed content of What kind of protection is implemented for computers that store and process state secrets?. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

Dreamweaver Mac version
Visual web development tools

MinGW - Minimalist GNU for Windows
This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.

SublimeText3 English version
Recommended: Win version, supports code prompts!

WebStorm Mac version
Useful JavaScript development tools
