Joke Collection Website - Blessing messages - Why is it important to keep information confidential?

Why is it important to keep information confidential?

While informatization brings convenience, it also brings information leakage. Social engineering tells us that information you don't think is important at work and information you take for granted by people with ulterior motives will cause very important information leakage, and informatization makes it too easy for these information to leak.

Problems existing in confidentiality work

(A) a weak sense of confidentiality. Most police officers are impressed by the traditional confidentiality requirements, but they lack understanding of the advanced means of stealing secrets in the high-tech state, and have insufficient understanding and weak awareness of the manifestations of information network security under the new situation. The main manifestations are as follows: (1) The network of the procuratorial system has been physically isolated from the internal and external networks, the information security defense has been very solid, and the unit has not had a leak accident for many years in a row, so it is careless in thinking. It randomly installs software unrelated to work in the internal network computer, mixes confidential and non-confidential U disks, and handles some case information in the external network; (2) Insufficient understanding of the importance of confidentiality in procuratorial work, believing that procuratorial work does not involve important state secrets, and "nothing can be kept"; (3) Some policemen think that online security is a matter for security departments and technical departments, and has nothing to do with them. These misconceptions hinder the adoption of active defensive measures to prevent leakage.

(2) Poor management of classified networks. The confidentiality requirements of individual departments are limited to the storage and recovery of documents and materials, and the importance of computer equipment and network equipment involving a large number of confidential information is not paid enough attention. The main manifestations are: (1) the rules and regulations are not perfect, some departments lack perfect management methods for computer office equipment and internal LAN, and there is no relevant system constraint, so network management is in a state of laissez-faire; Even if some systems exist, they often become a mere formality due to incomplete content and detailed terms, and their implementation is weak, which can not meet the needs of the current situation; (2) The security management is lax, individual policemen do not abide by laws and regulations, the security system is not implemented, and there is a lack of strict network security supervision and inspection and sanctions. (3) Lack of effective management measures. There is a lack of effective management methods for the use and management of mobile storage media such as U disk, mobile phone and portable computer.