Traditional Culture Encyclopedia - Traditional culture - What protection for computers storing and processing state secrets
What protection for computers storing and processing state secrets
Storage and processing of state secrets of the computer to implement graded protection, storage and processing of state secrets of the computer, according to the basic requirements of the national information security level of protection, in accordance with the state secrecy department of the classified information system graded protection. Storage and processing of state secrets of the computer to implement hierarchical protection.
Storage, processing of state secrets of the computer information system in accordance with the degree of confidentiality to implement graded protection. The so-called implementation of graded protection, that is, the provisions of the storage, processing and transmission of state secrets of the computer information system in accordance with the degree of confidentiality of the implementation of graded protection, to take different degrees of protection and management measures. Among other things, the degree of confidentiality refers to the classified level of the state secret information stored, processed and transmitted by the classified information system, and is the basis for determining the level of security and confidentiality protection of the system. Classified information systems should be classified as top secret, confidential and secret in accordance with the highest classified level of information handled by the system's planning and design, and should be protected in accordance with the requirements for protection of different intensities. Centralized processing of work secrets of the information system, should refer to the secret level of information systems for protection.
Graded protection, refers to the construction and use of classified information systems in accordance with the management of graded protection and national confidentiality standards, the different levels of classified information systems to take appropriate security and confidentiality protection measures, to ensure that neither over protection, nor under protection. Confidentiality administration departments at all levels implement appropriate supervision and management according to the different levels of classified information systems to ensure the security of classified information systems and their storage, processing and transmission of state secret information.
- Related articles
- Why does Hollywood pay more attention to Japan when choosing the oriental cultural background?
- Manufacturing method and steps of fish tank
- Why are there "national tides" and "national winds"?
- Brief introduction to the basic model of Buddhist temple architecture
- What about Fuzhou Aimore Culture Communication Co., Ltd.?
- What is the function of management accounting? What are the functional features?
- How to make sour kimchi
- Write an essay with the flavor of New Year 200 words
- How to preserve walnuts from spoilage?
- The long list of Ming furniture includes