Joke Collection Website - News headlines - What are the "five prohibitions and ten prohibitions" in information security?

What are the "five prohibitions and ten prohibitions" in information security?

The five prohibitions are:

1. It is forbidden to connect confidential information systems to the Internet and other public information networks;

Second, it is forbidden to cross-use mobile storage devices such as USB flash drives between classified computers and non-classified computers;

(3) It is forbidden to copy data from public information networks such as the Internet to classified information systems without protective measures;

4. It is forbidden to mix classified computers and classified mobile storage devices with non-classified computers and non-classified mobile storage devices;

5. It is forbidden to use equipment with wireless function to process confidential information.

Ten cannot be:

First of all, classified computers are not allowed to connect to the Internet; ?

Two, classified computers shall not use wireless network cards; ?

Three, classified computers shall not install software of unknown origin; ?

4. Confidential computers shall not be used and kept by others; ?

5. Confidential computers shall not cross-use storage media with non-confidential computers;

Six, classified computers shall not be eliminated at will; ?

Seven, classified computers shall not install additional equipment such as cameras; ?

8. Don't store confidential files on non-confidential computers; ?

9. Don't handle confidential documents on non-confidential office equipment; ?

10. Don't talk about confidential information on the phone.

Information security law

Information security law refers to the general name of criminal legal norms for maintaining information security and preventing information crimes. This is an information security law in a narrow sense. Broadly speaking, the adjustment scope of the Information Security Law should include the emergency protection relationship of network information security, the analysis and early warning relationship of information sharing, the information security management of government agencies, the security supervision of communication operators, the security supervision of ISP, the security supervision of ICP (including large commercial organizations), the security responsibility of home users and commercial enterprise users, the import and export supervision of network and information security technology, the standards and guidelines of network and information security, and the evaluation and supervision of network and information security. The regulated object of generalized information security law involves all aspects of information security. Its advantage lies in the all-round observation and elaboration of information security, and its disadvantage lies in the "mixing of various laws" in the legal field, which cannot form a departmental law. The narrow sense of information security law only refers to the criminal law that guarantees information security and punishes information crimes. Relatively speaking, the purpose is clearer, the legal structure is concise and clear, and it is convenient for legislation. Judging from the information security legislation of various countries in the world, the information security law mainly refers to a criminal law.