Home > Common Problem > What must be done to recover data stored in confidential computers and related equipment?

What must be done to recover data stored in confidential computers and related equipment?

青灯夜游
Release: 2023-01-13 00:23:09
Original
16503 people have browsed it

The recovery of data stored in confidential computers and related equipment must be carried out at a "confidential data recovery qualification unit approved by the national confidentiality administration department". Computers that use functions such as collection, processing, storage, transmission, and retrieval to process information involving state secrets are often called classified computers; secret-related computers are not allowed to use computer peripherals with wireless interconnection functions.

What must be done to recover data stored in confidential computers and related equipment?

The operating environment of this article: Windows 7 system, Dell G3 computer.

The recovery of data stored in confidential computers and related equipment must be carried out at a "confidential data recovery qualification unit approved by the national confidentiality administration department."

Extended information:

Computers that use functions such as collection, processing, storage, transmission, and retrieval to process information involving state secrets are usually called classified computers.

Office automation equipment such as computers, fax machines, and photocopiers that handle confidential information should be repaired within the unit, with specialized personnel supervising the site. Maintenance personnel are strictly prohibited from reading or copying confidential information; if it really needs to be sent out for repair , the confidential information storage components should be removed.

When confidential information equipment is converted into non-confidential information equipment or eliminated, the confidential information storage components should be removed.

Secret-related computers are not allowed to use computer peripherals with wireless interconnection functions such as "wireless keyboards, wireless mice, wireless network cards". These devices and computers are connected wirelessly, and the signals used to process and transmit information are completely exposed in the air. Unrelated personnel can receive these signals through relevant technical equipment and perform signal restoration processing. Therefore, classified computers cannot use computer peripherals with wireless interconnection capabilities.

Foreign countries, especially some developed countries, often require their designers and manufacturers of computers, encryption machines and other electronic equipment to install "backdoors" in exported computers and equipment in order to facilitate the theft of other countries' information. In addition, some computers have wireless interconnection functions, and some security performance does not meet standards. Purchasing such a computer and using it to process confidential information can easily leave hidden leaks and information security risks.

When purchasing confidential computers, special attention should be paid to the following:

(1) In principle, domestic equipment should be purchased. If you need to purchase imported computers and equipment, you must purchase computers and equipment that have been tested and approved by the relevant national competent authorities;

(2) When purchasing, you must choose randomly and do not make a reservation in advance. Once selected, purchase and pick up the goods immediately to prevent others from setting up or installing secret-stealing devices;

(3) Do not purchase computers with wireless network cards and wireless interconnection functions. If the computer has been purchased and prepared to be used to process confidential information, the hardware module with wireless interconnection function must be removed before use;

(4) The computer must be subject to special security and confidentiality technology testing by relevant departments before use , and then use it to process confidential information after confirming that there are no risks of leakage or security risks.

The above requirements also apply to the purchase of other confidential office equipment.

The above is the detailed content of What must be done to recover data stored in confidential computers and related equipment?. For more information, please follow other related articles on the PHP Chinese website!

Related labels:
source:php.cn
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Popular Tutorials
More>
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template