Computer technology and security;
(1) Use low-emission computer equipment. This is the fundamental measure to prevent computer radiation from leaking out. In the design and production process of these devices, radiation protection measures are taken for components, integrated circuits, connecting wires and CRT that may produce information radiation, so as to minimize the information radiation of the devices.
(2) shielding. According to the amount of radiation and the objective environment, the components in the computer room or host are shielded, and they are turned on after passing the test.
Enclosing the computer and auxiliary equipment with a gold shielding cage (faraday cage) and grounding the global shielding cage can effectively prevent the electromagnetic radiation of the computer and auxiliary equipment. Without the above conditions, the computer radiation signal area can be controlled and outsiders are not allowed to get close.
(3) interference. According to the principle of electronic countermeasures, some technical measures are taken to radiate the noise generated by jammer and the information radiation generated by computer equipment. Interfere with computer radiation signals, increase the difficulty of receiving and decoding, and protect confidential information radiated by computers.
If the above conditions are not met, computers dealing with important information can also be placed in the middle, and computers dealing with general information can be placed around. This method can reduce the possibility of receiving and recovering radiation information.
(4) Technical prevention of online leaks: First, identification. Computer identification of users is mainly to check the passwords entered by users, and legitimate users in the network also have the right to use resource information, so the use of passwords should be strictly managed.
Of course, there are other ways to identify users, such as using magnetic cards, fingerprints, sounds, retinal images and so on. The second is to monitor the alarm. Make a detailed record of the work of legitimate users of the network. For illegal users, the number and time of computer attempts to break into the network.
Telephone number, etc. It is recorded and an alarm is issued to track the whereabouts of illegal users. The third is encryption. Encrypt and store the information in the computer, and write down the special calling password. In this way, after the thief broke through the general password and entered the computer, he could not call out the information.
In the process of information transmission, the information is encrypted (disguised once or twice), and the thief knows nothing even if he intercepts the signal. The fourth is digital signature.
(5) Technical prevention of media leaks: First, copy prevention. Anti-copy technology is actually to mark the media with special marks, such as laser spots, perforations, fingerprints and other special marks on the CD. This special mark can be recognized by encryption programs, but it cannot be easily copied.
The second is encryption. Encrypt the files in the media so that they cannot be transmitted by conventional methods. Because ciphertext encryption has not formed a perfect system in theory, there are many additional methods, and there are no certain rules to follow. Usually it can be divided into substitution password, transposition password and strip product password. The third is degaussing.