Use a wired connection between a classified printer and a classified computer; wireless connections are never allowed between a classified printer and a classified computer. When using wireless connection methods, the signals used to process and transmit information will be completely exposed in the air. Unrelated personnel can receive these signals through relevant technical equipment and perform signal restoration processing; therefore, confidential computers cannot use computer peripherals with wireless interconnection functions. .
The operating environment of this tutorial: Windows 7 system, Dell G3 computer.
A wired connection is used between the confidential printer and the confidential computer. Wireless connections between classified printers and classified computers are never allowed.
Computers that use functions such as collection, processing, storage, transmission, and retrieval to process information involving state secrets are usually called classified computers.
Wireless keyboards, wireless mice, wireless network cards, etc. are all computer peripherals with wireless interconnection functions.
These devices are connected to computers through wireless means, and the signals for processing and transmitting information are completely exposed in the air. Unrelated personnel can receive these signals through relevant technical equipment and perform signal restoration processing. Therefore, classified computers cannot use computer peripherals with wireless interconnection capabilities.
Therefore, confidential meetings and activities should be held in places that meet confidentiality requirements. The electronic equipment and facilities such as loudspeakers and recordings used should be tested for safety and confidentiality. The carrying and use of audio and video equipment should be approved by the organizer. approve. Wireless equipment or devices such as mobile phones, walkie-talkies, cordless phones, wireless microphones, wireless keyboards, wireless network cards, etc. are not allowed to be used, and video and telephone conferencing systems that do not meet confidentiality conditions are not allowed to be used.
Expand knowledge:
What method should be used when virus databases, system patches, etc. need to be imported into confidential information systems?
Confidential information system mainly refers to computer equipment used to process confidential information or a confidential information exchange network system used to realize internal office automation. Generally speaking, confidential information systems refer to computer systems that have certain security and confidentiality needs and requirements. In accordance with national mandatory standards and regulations, computer systems that reach a certain security level are called confidential information systems.
When it is necessary to import virus databases, system patches, etc. into confidential information systems, the method that can be adopted is to burn a read-only CD through an intermediate machine.
How to copy information from the Internet and other public information networks to confidential computers?
To ensure the security and confidentiality of confidential information, it is strictly prohibited to directly copy information from the Internet or other public information networks to confidential computers. If you really need to copy for work, you can use the following methods:
1. Burn the data to be copied to a blank CD, and then copy the data to a confidential computer through the CD.
2. First copy the data on the Internet to a separate intermediate machine, completely remove the secret-stealing program and check for viruses, and then copy it to the confidential computer.
3. Use information one-way import equipment approved by the national confidentiality administration department.
Tips: It is strictly prohibited to use removable storage media other than CDs to directly copy files and information from a computer connected to the Internet to a confidential computer.
Confidentiality requirements for using communication equipment (ordinary mobile phones)
Use Ordinary mobile phones are not allowed to involve state secrets in communications;
are not allowed to store, process, or transmit information involving state secrets;
are not allowed to connect to Confidential information systems, classified information equipment or classified carriers;
shall not store sensitive information such as the work unit, position, red phone number and other sensitive information of core confidential personnel;
The location service function is not allowed to be turned on and used in confidential official activities;
is applying When registering a mobile phone number, registering a mobile phone email, or activating other functions, information such as the name and address of a confidential unit that is prohibited from being disclosed shall not be filled in;
shall not be used without network access permission from the national telecommunications management department. Mobile phone;
Do not use mobile phones donated by overseas institutions or overseas personnel.
Cell phones are not allowed to be brought into confidential vital parts, confidential meetings and event venues.
Cell phones are not allowed to be used in confidential areas.
Mobile phones are not allowed to be used for video calls, taking photos, surfing the Internet, recording and recording in places where confidential information equipment is used.
Commercial encrypted mobile phones are not allowed to be used to discuss, store, process, or transmit state secret information.
For more related knowledge, please visit the FAQ column!
The above is the detailed content of What connection is used between a classified printer and a classified computer?. For more information, please follow other related articles on the PHP Chinese website!