Computers connected to the Internet in confidential places must not be equipped with or install audio and video input devices; wireless keyboards, wireless mice, wireless network cards, etc. are computer peripherals with wireless interconnection functions; the connection between these devices and the computer It is connected through wireless means. The signals for processing and transmitting information are completely exposed in the air. Unrelated personnel can receive these signals through relevant technical equipment and perform signal restoration processing. Therefore, confidential computers cannot use computer peripherals with wireless interconnection functions. .
The operating environment of this tutorial: Windows 7 system, Dell G3 computer.
What kind of computers are not allowed in confidential places?
Computers connected to the Internet in confidential locations must not be equipped with or installed audio and video input devices.
Computers that use functions such as collection, processing, storage, transmission, and retrieval to process information involving state secrets are usually called classified computers.
Wireless keyboards, wireless mice, wireless network cards, etc. are all computer peripherals with wireless interconnection functions. These devices and computers are connected wirelessly, and the signals used to process and transmit information are completely exposed in the air. Unrelated personnel can receive these signals through relevant technical equipment and perform signal restoration processing. Therefore, classified computers cannot use computer peripherals with wireless interconnection capabilities.
Foreign countries, especially some developed countries, often require their designers and manufacturers of computers, encryption machines and other electronic equipment to install "backdoors" in exported computers and equipment in order to facilitate the theft of other countries' information. In addition, some computers have wireless interconnection functions, and some security performance does not meet standards. Purchasing such a computer and using it to process confidential information can easily leave hidden leaks and information security risks.
When purchasing confidential computers, special attention should be paid to the following:
(1) In principle, domestic equipment should be purchased. If you need to purchase imported computers and equipment, you must purchase computers and equipment that have been tested and approved by the relevant national competent authorities;
(2) When purchasing, you must choose randomly and do not make a reservation in advance. Once selected, purchase and pick up the goods immediately to prevent others from setting up or installing secret-stealing devices;
(3) Do not purchase computers with wireless network cards and wireless interconnection functions. If the computer has been purchased and prepared to be used to process confidential information, the hardware module with wireless interconnection function must be removed before use;
(4) The computer must be subject to special security and confidentiality technology testing by relevant departments before use , and then use it to process confidential information after confirming that there are no risks of leakage or security risks.
The above requirements also apply to the purchase of other confidential office equipment.
For more related knowledge, please visit the FAQ column!
The above is the detailed content of What kind of computers are not allowed in classified places?. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Safe Exam Browser
Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.

VSCode Windows 64-bit Download
A free and powerful IDE editor launched by Microsoft

MantisBT
Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.
