Shenyang Military Region, mechanized infantry brigade who cut off the network response to security check (Figure)
Data for: People’s Liberation Army soldiers use computers to learn skills
Shi Qiang Song Shuhua newspaper correspondent to the brave
heard the confidential inspection of the “wind”, and reinstall the computer system, format the hard disk, closed USB port, engaging in “hide and seek” game. To fundamentally solve these problems, the Shenyang Military Region, the expansion of a mechanized infantry brigade information through print room, the introduction of advanced protection software, additional carrier destroy secret center, the effective demand for office and secrecy to resolve the contradiction between the construction. Not long ago, their approach has been higher recognition.
no secret text map printing “court”
year, the brigade authorities in the inspection, a company with a non-commissioned officers for information to local advertising company producing promotional drawing board, to be informed of picketing. To this end, in the month of “two-way,” commented the meeting, the company has with authorities playing a “lawsuit”: notification requirements under the authority making the study of theory publicity drawing board, forces from within and without the printing room, less than the local produce, a quick implementation?
a “lawsuit” How much reflection. Later, authorities at the grassroots level working group bottom: Because of work and office needs, but not in the quartering areas and Printing business in the past authorities, primary production of publicity drawing board, banners, and posters advertising company to go to the city making, color printing camp light box, screen printed text but also to the resident community, some still classified information content … …
this, the brigade party “members” are: To resolve this contradiction, we must work to solve and office needs to start building their own printing room, essentially eliminate the risk. Immediately, the soldiers in the brigade office workers in three columns: the grass roots all the way to carry out investigation and deliberation, and information security topics, to guide the officers and men to establish a sense of crisis and sense of confidentiality; all the way to printing and copying equipment manufacturers to examine the consultation, the purchase of equipment; is entered in another way to study advertising printing, production of related technologies.
month later, the brigade expansion of the original copy room, the addition of color printing, color ink printing, cutting, perfect binding and other services, for internal services, both to achieve the “Network for” at all levels need to print information transmitted through the office system, to avoid the copy part of the disclosure risk, but also by “non-cash settlement,” charges deducted from the corresponding units of funding, quick and easy. Not only outdoor printing, color printing and a number of fine art equipment, but also developed, with a group of master design, inkjet printing will be the backbone of the business, expanding the scale of construction, business and service functions to meet the printing units, making and other needs.
Today, the brigade’s barracks room information printed unanimously welcomed by the officers and men, we say: here the production and printing, not only economic, convenient and fast, but do not worry about leaks.
block the leakage of classified information channels
“the page you are looking for is currently unavailable …” In February, the brigade commissar total net HOU Click , login information page grass-roots, wanted, straight out of a computer screen, “can not be displayed” message.
“forces had implemented office automation, networking also intermittent loud noise?” With questions, Hou went to grass-roots companies account for observed pure truth. Step five with the installation, instructor Lee Ji of embarrassing things about the piece: “Not long ago, the company worried about the confidentiality of information check out the ‘flaws’, simply cut off the cable, has been responsible for managing staff recognition. Wanted, front foot just bid farewell to security inspection team, the company because of poor network construction, but also criticized by the authorities … “responsible for the political network of Publicity Division Director Lee also tell the truth:” Information security is a block of iron, who touched who is bleeding, as long as the check, we do not delete computer data, is redo the computer system, sometimes plugging the USB interface … … normal working order of interference, a lot of work can not affect the rank and file online knowledge, entertainment, training and information transfer. “
The tour party “members” in the security situation in the analysis was mainly due to the current use of computer firewall, intrusion detection, isolation and other protective measures inside and outside the network, it is difficult to meet the needs of information security, classified information either through removable storage devices away, the network can also be heard. Hence, all the channels to plug leaks, it will make a sealed computer, and cut off the network of absurd things.
“not unworthy, must find a way to prevent an effective security education and technology together!”
this end, the brigade in strengthening security and education for full loss of anti-leak alarm watch educational films and educational panels at the same time, in every office computer and hard disk, U disk to install the computer and security management system classified the carrier to ensure that the external mobile storage device is not registered can not enter, no copy, with no take office for any information on the Internet, officers and soldiers in the hands of the storage devices have been registered on the computer in the Internet connection is not available, the storage of classified information, dissemination and processing requirements to achieve a safe and reliable.
due to technical precautions properly, will not affect the office and learning, but also blocked the loss of leak vulnerability. At the same time, they also developed a strict secret carrier of Use, and increase the carrier confidentiality of secret inspection, blocked the leakage of classified information channels.
classified storage media with the “Terminator”
end of last year, the brigade chief of security Lv Guokui passing waste incineration field, picked up on the ground the wreckage of a U disk. The understanding of the original officers and men is a destruction of the first day here a number of storage media.
“treated U-disk can be found in the classified information?” Lv Guokui full of doubts, with automatic station identification of the wreckage came to the brigade. Zhi Bao took the staff saw the surface of the core U-disk has been burned, treated, then smoothly connected to the computer. Really do not know do not check, a check surprised, there are the Department last year’s training program. The investigation that: the owner of the U disk even have instruments Zhang. Retired at the end when, according to the provisions of Sally handed the company on the U disk, and even where in its processing, not completely destroyed.
this to you sounded a warning, they then found that the absence of a special secret destruction of the carrier system and disposal sites, some of the documents for crushing, incineration does not completely lead to data loss Some of the magnetic media, semiconductor storage media, optical media, such as improper destruction of secret carriers, resulting in leakage problems, there’s the “retired” computers, hard disk, U disk and other mismanagement, piled in warehouses, and even some free disassembly assembly components, resulting in the loss of classified information … …
disposal of waste classified carrier, information security is an important part of one, mishandled, prone to problems. As a result, the brigade first establish a system of secret destruction of the carrier handling, set the carrier destroyed secret center. To this end, they make the room, out of funds, with a detector, furnace, fan, broken mills, shredders and other equipment, to be eliminated, idle computer, U disk and other secret carriers, implementation of the encryption, decryption, maintenance, destruction and disposal of Evaluation and Certification.
destroyed following the establishment of the brigade has hundreds of sets of primary (a) were identified scrapped, destroyed computers (U disk), and more than a thousand copies of documents and other classified information in a unified time, central location , hand and hand under the supervision of the organization effectively destroyed. At the same time, they also learn by analogy, all used or scrap of secret carriers implement the “household-style” management files were set up residence, to purchase, issuance, use, modification, scrapped, destroyed and other information detailed records, and press requirements for data encryption and authentication to achieve a fine, and eliminate the loss of leak problems.