Computer information systems are subject to hierarchical protection according to the degree of confidentiality; confidential information systems are divided into top secret level, confidential level, and secret level according to the degree of confidentiality; agencies and units should store and process information according to the confidentiality level of the confidential information system. The highest security level determines the security level of the system, and corresponding security and confidentiality protection measures are taken according to the hierarchical protection requirements.
#The operating environment of this tutorial: Windows 7 system, Dell G3 computer.
What protection is implemented for computer information systems according to the degree of confidentiality?
Legal analysis:
Computer information systems that store and process state secrets are subject to hierarchical protection according to the degree of confidentiality involved. Confidential information systems are divided into top secret level, confidential level and secret level according to the degree of confidentiality. Agencies and units shall determine the confidentiality level of the system based on the highest level of confidentiality of the information stored and processed by the confidential information system, and adopt corresponding security and confidentiality protection measures in accordance with the hierarchical protection requirements.
Legal basis:
"Law of the People's Republic of China on Guarding State Secrets" Article 23 Computer information systems that store and process state secrets (hereinafter referred to as confidential information systems) shall be classified according to the degree of confidentiality involved. Implement hierarchical protection.
Confidential information systems shall be equipped with confidentiality facilities and equipment in accordance with national confidentiality standards. Confidential facilities and equipment should be planned, constructed, and operated simultaneously with confidential information systems.
Confidential information systems shall be put into use only after passing the inspection in accordance with regulations.
For more related knowledge, please visit the FAQ column!
The above is the detailed content of What protection is implemented for computer information systems according to the level of confidentiality?. For more information, please follow other related articles on the PHP Chinese website!