-
Computers and information systems involving secrets shall be managed and protected in accordance with the corresponding level of confidentiality for the information stored and processed; Computers and information systems involving secrets shall select security and confidentiality products that have been tested by the evaluation bodies authorized by the relevant competent state departments, and shall be correctly configured and used; Computers and information systems involving secrets shall employ identity authentication, access control, and security audits.
The secret-related information system is divided into three levels: top secret, confidential and secret, and is protected according to the highest level of confidentiality of information handled by the system planning and design, and is protected according to the requirements of different intensities.
Information systems involving secrets shall be equipped with facilities and equipment for secrecy in accordance with state secrecy standards. Secret-guarding facilities and equipment shall be planned, constructed, and operated simultaneously with the secret-related information system. A secret-related information system shall, in accordance with regulations, be put into use only after passing the inspection.
-
Classified information stored, processed, transmitted, or exported by computer information systems must have corresponding classification identification, and the classification identification cannot be separated from the main text.
According to Article 10 of the Interim Provisions on the Management of Confidentiality of Computer Information Systems (Guo Bao Fa [1998] No. 1), the classified information stored, processed, transmitted and exported by computer information systems shall have corresponding classification marks, and the classification marks shall not be separated from the main text.
In addition, according to Articles 9 and 11 of the "Interim Provisions on the Management of the Secrecy of Computer Information Systems", confidential information and data must be collected, stored, processed, transmitted, used, and destroyed in accordance with the secrecy provisions. State secret information must not be stored, processed, or transmitted in computer information systems that are networked with international networks.
-
The confidential information stored, processed, transmitted, and output by the information system must have a corresponding classification mark, and the mark cannot be separated from the text!
-
What is correct in the statement of classified information systems is the installation of security technical procedures and management procedures.
There are certain security and confidentiality requirements for secret-related information systems, and according to the relevant state standards, the construction of secret-related information systems is a computer system that needs to be merged and must achieve a higher level of security.
Whether or not a computer information system is a classified information system mainly depends on whether the information in the system involves state secrets, and no matter how much or less information is involved in it, as long as there is (i.e., the information is stored, processed, or transmitted), the information system is a classified information system.
However, not all classified systems are high-security computer information systems; Not all high-security computer information systems are classified information systems.
For example, the computer information systems of some enterprises have adopted many technical and management measures to protect their trade secrets, and have reached a high level of security, but because there is no information involving state secrets, it cannot be regarded as a classified information system; However, there are some party and government organs that have a very small scope of secret-related networks.
Only a number of computers in one or a few rooms are networked, relatively closed physical security measures have been adopted, and they are physically isolated from the outside world; although no more security and secrecy technology has been adopted, and the security level of the system is not very high, because of the strict management, security and controllability, and the operation of state secret information in the system, these systems belong to the classified information system.
Secret-related systems are to be classified into top secret, confidential, and secret according to the degree of secrecy, and hierarchical protection is to be implemented. According to the level of secrecy of the classified information, the importance of the classified information system, the harm caused to the national economy and the people's livelihood after being destroyed, and the level of security protection that the classified information system must achieve, it is divided into three levels: secret, confidential and top secret.
The National Center for Secrets Science and Technology Evaluation is the only institution in China that evaluates the security and confidentiality of information systems involving secrets.
-
1.Connecting classified computers and storage devices to the Internet and other public information networks; 2.exchange information between classified information systems and the Internet and other public information networks without taking protective measures; 3.
using non-classified computers and non-classified storage devices to store and process state secret information; 4.uninstalling or modifying the security technology procedures and management procedures of the classified information system without authorization; 5.Donate, discard, or repurpose classified computers or storage devices that have not been processed by security technology for other purposes.
-
Summary. Expansion: Classified information system refers to a computer information system that handles state secrets and other confidential information, which has a high level of security and requires special security measures to ensure information security.
The following is the correct statement about the classified information system:1Classified information systems need to undergo security assessment and certification to ensure that their security meets national standards and security requirements.
2.Classified information systems should implement strict security measures such as identity authentication, access control, and data encryption to prevent illegal users from accessing the system and illegally obtaining sensitive information. 3.
Secret-related information systems should be regularly scanned, monitored, and repaired for security vulnerabilities, and security problems should be dealt with in a timely manner to improve the overall security level of the system.
Hello dear, the correct statement about the classified information system is: the correct one is the first and the second.
Expansion: Classified information system refers to a computer information system that handles state secrets and other confidential information, which has a high level of security and requires special security measures to ensure information security. Here's the correct way to say about classified information systems:
Elimination 1Classified information systems also need to undergo security assessment and certification to ensure that their security meets national standards and security requirements. 2.
Strict security measures such as identity authentication, access control, and data encryption should be implemented in classified information systems to prevent illegal users from accessing the system and illegally obtaining sensitive information. 3.Secret-related information systems should be regularly scanned, monitored, and repaired for security vulnerabilities, and security problems should be dealt with in a timely manner to improve the overall security level of the system.
4.The storage, transmission, promotion and processing of sensitive information in classified information systems all need to comply with relevant security regulations and procedures to ensure that the information is not leaked, tampered with or lost. 5.
For the operation and maintenance personnel of classified information systems, strict background checks and security training should be carried out to ensure that their behavior and operation do not pose a threat to the security of the information information system.
What is the difference between Grade A and Grade B? Let's take a look at it with Tongbang Information Technology. >>>More
The differences between the two are as follows:
1. The communication and signal system major includes system simulation, multiple access technology, digital modulation and demodulation technology, channel dynamic assignment technology, synchronization technology, multi-user detection technology, voice compression technology, broadband multi-** technology and radio frequency technology of digital mobile communication system. >>>More
The command information system consists of six parts: an information collection subsystem, an information transmission subsystem, an information processing subsystem, an information display subsystem, a decision-making monitoring subsystem, and an execution subsystem. >>>More
1.First of all, this major includes not only management and computer science, but also some accounting, technical economics, etc. The first two are the focus. >>>More
It's not that this major is bad, but it's not good at learning, that is, there are a lot of people, and not many of them! But the prospect is still okay, because people who have technology and can manage are still very open! >>>More