Home  >  Article  >  What kind of computers are not allowed in classified places?

What kind of computers are not allowed in classified places?

藏色散人
藏色散人Original
2022-10-31 17:42:565067browse

Computers connected to the Internet in confidential places must not be equipped with or install audio and video input devices; wireless keyboards, wireless mice, wireless network cards, etc. are computer peripherals with wireless interconnection functions; the connection between these devices and the computer It is connected through wireless means. The signals for processing and transmitting information are completely exposed in the air. Unrelated personnel can receive these signals through relevant technical equipment and perform signal restoration processing. Therefore, confidential computers cannot use computer peripherals with wireless interconnection functions. .

What kind of computers are not allowed in classified places?

The operating environment of this tutorial: Windows 7 system, Dell G3 computer.

What kind of computers are not allowed in confidential places?

Computers connected to the Internet in confidential locations must not be equipped with or installed audio and video input devices.

Computers that use functions such as collection, processing, storage, transmission, and retrieval to process information involving state secrets are usually called classified computers.

Wireless keyboards, wireless mice, wireless network cards, etc. are all computer peripherals with wireless interconnection functions. These devices and computers are connected wirelessly, and the signals used to process and transmit information are completely exposed in the air. Unrelated personnel can receive these signals through relevant technical equipment and perform signal restoration processing. Therefore, classified computers cannot use computer peripherals with wireless interconnection capabilities.

Foreign countries, especially some developed countries, often require their designers and manufacturers of computers, encryption machines and other electronic equipment to install "backdoors" in exported computers and equipment in order to facilitate the theft of other countries' information. In addition, some computers have wireless interconnection functions, and some security performance does not meet standards. Purchasing such a computer and using it to process confidential information can easily leave hidden leaks and information security risks.

When purchasing confidential computers, special attention should be paid to the following:

(1) In principle, domestic equipment should be purchased. If you need to purchase imported computers and equipment, you must purchase computers and equipment that have been tested and approved by the relevant national competent authorities;

(2) When purchasing, you must choose randomly and do not make a reservation in advance. Once selected, purchase and pick up the goods immediately to prevent others from setting up or installing secret-stealing devices;

(3) Do not purchase computers with wireless network cards and wireless interconnection functions. If the computer has been purchased and prepared to be used to process confidential information, the hardware module with wireless interconnection function must be removed before use;

(4) The computer must be subject to special security and confidentiality technology testing by relevant departments before use , and then use it to process confidential information after confirming that there are no risks of leakage or security risks.

The above requirements also apply to the purchase of other confidential office equipment.

For more related knowledge, please visit the FAQ column!

The above is the detailed content of What kind of computers are not allowed in classified places?. For more information, please follow other related articles on the PHP Chinese website!

Statement:
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn