Secret-related computers should be managed according to the highest confidentiality level for storing and processing information; confidential information systems are divided into top secret level, confidential level, and secret level according to the degree of confidentiality; agencies and units should store and process confidential information according to the system The highest confidentiality level of information determines the confidentiality level of the system, and corresponding security and confidentiality protection measures are taken according to the hierarchical protection requirements.
The operating environment of this tutorial: Windows 7 system, Dell G3 computer.
What confidentiality level should secret-related computers store and process information according to?
Confidential computers should be managed according to the highest confidentiality level for storing and processing information.
Confidential information systems are divided into top secret level, confidential level and secret level according to the degree of confidentiality. Agencies and units shall determine the confidentiality level of the system based on the highest level of confidentiality of the information stored and processed by the confidential information system, and adopt corresponding security and confidentiality protection measures in accordance with the hierarchical protection requirements.
Confidential information systems shall be tested and evaluated by a confidentiality evaluation institution established or authorized by the national confidentiality administration department, and must be reviewed and qualified by the confidentiality administration department at or above the level of a districted city or autonomous prefecture before it can be put into use.
The management of confidential computers shall be carried out in accordance with the national "Interim Provisions on the Management of Confidentiality of Computer Systems". The "Interim Provisions on the Security Management of Computer Information Systems" is a document issued by the State Security Administration on February 26, 1998.
The document stipulates that confidential information stored, processed, transmitted, and output by a computer information system must have a corresponding confidentiality level mark, and the confidentiality level mark cannot be separated from the main text. Confidential computers should be managed according to the highest level of confidentiality of the information stored and processed and registered. Confidential computer security protection software and equipment must not be uninstalled or modified without authorization. Confidential computers must not be connected to public information networks such as the Internet, and wireless network cards and wireless mice must not be used. , wireless keyboard and other equipment.
For more related knowledge, please visit the FAQ column!
The above is the detailed content of What confidentiality level should be used to store and process information on confidential computers?. For more information, please follow other related articles on the PHP Chinese website!