search
HomeCommon ProblemWhat confidentiality level should be used to store and process information on confidential computers?

Secret-related computers should be managed according to the highest confidentiality level for storing and processing information; confidential information systems are divided into top secret level, confidential level, and secret level according to the degree of confidentiality; agencies and units should store and process confidential information according to the system The highest confidentiality level of information determines the confidentiality level of the system, and corresponding security and confidentiality protection measures are taken according to the hierarchical protection requirements.

What confidentiality level should be used to store and process information on confidential computers?

The operating environment of this tutorial: Windows 7 system, Dell G3 computer.

What confidentiality level should secret-related computers store and process information according to?

Confidential computers should be managed according to the highest confidentiality level for storing and processing information.

Confidential information systems are divided into top secret level, confidential level and secret level according to the degree of confidentiality. Agencies and units shall determine the confidentiality level of the system based on the highest level of confidentiality of the information stored and processed by the confidential information system, and adopt corresponding security and confidentiality protection measures in accordance with the hierarchical protection requirements.

Confidential information systems shall be tested and evaluated by a confidentiality evaluation institution established or authorized by the national confidentiality administration department, and must be reviewed and qualified by the confidentiality administration department at or above the level of a districted city or autonomous prefecture before it can be put into use.

The management of confidential computers shall be carried out in accordance with the national "Interim Provisions on the Management of Confidentiality of Computer Systems". The "Interim Provisions on the Security Management of Computer Information Systems" is a document issued by the State Security Administration on February 26, 1998.

The document stipulates that confidential information stored, processed, transmitted, and output by a computer information system must have a corresponding confidentiality level mark, and the confidentiality level mark cannot be separated from the main text. Confidential computers should be managed according to the highest level of confidentiality of the information stored and processed and registered. Confidential computer security protection software and equipment must not be uninstalled or modified without authorization. Confidential computers must not be connected to public information networks such as the Internet, and wireless network cards and wireless mice must not be used. , wireless keyboard and other equipment.

For more related knowledge, please visit the FAQ column!

The above is the detailed content of What confidentiality level should be used to store and process information on confidential computers?. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
3 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
3 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
3 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
WWE 2K25: How To Unlock Everything In MyRise
4 weeks agoBy尊渡假赌尊渡假赌尊渡假赌

Hot Tools

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

VSCode Windows 64-bit Download

VSCode Windows 64-bit Download

A free and powerful IDE editor launched by Microsoft

MinGW - Minimalist GNU for Windows

MinGW - Minimalist GNU for Windows

This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.

ZendStudio 13.5.1 Mac

ZendStudio 13.5.1 Mac

Powerful PHP integrated development environment

WebStorm Mac version

WebStorm Mac version

Useful JavaScript development tools