Найти в Дзене

Information Security (part 1)

With the rapid development of information technology and high-tech in China, our work is more dependent on computers and various informational office equipment around them, which constitute a computer information system. In the computer information system, information can be conveniently stored and transmitted, exist in the invisible, greatly reducing the controllability, resulting in computer information system leaking events frequently occur, then, how does the computer leak information? How to safely use computer to prevent information leakage? Today, safety net to introduce relevant information leakage security knowledge.

https://pixabay.com/illustrations/cyber-security-protection-technology-3400657/
https://pixabay.com/illustrations/cyber-security-protection-technology-3400657/

What is a computer information leak?

The so-called computer information leakage refers to the electromagnetic radiation emitted by the computer mainframe or related equipment under the non-human intentional operation. Although it is traced, it is still a way to steal computer information for some people who are interested. In any case, it is an information risk to computer holders.

The need to control computer information leakage

Nowadays, the application rate of computers is very high. No matter what industry and people will come into contact with it, the scope of work of computers is much wider than we think. Many information operations in the world are carried out by computers, and the amount of information carried in computers Absolutely a massive presence. The information carried in many computers is of great significance to countries, industries, units, and individuals. Once the consequences of the loss are very serious. Therefore, it is very important for the economy, politics, and national economy and people's livelihood to effectively prevent the leakage of computer information and ensure the security of information inside the computer.

Ways of leaking computer information

  1. Computer electromagnetic radiation leaks

Electromagnetic wave radiation can produce a highly representative spatial electromagnetic wave, which is actually a high-speed transmission of digital logic signals. The computer itself, which is the carrier of electromagnetic wave radiation, has the characteristics of high-speed propagation, and this electromagnetic wave radiation provides very favorable conditions. Computers usually perform digital signal processing under low voltage and high current. There are many harmonics in the digital signal, and these harmonics are very disturbing to the radio frequency.

In addition, the current circulating in the computer and related equipment usually shows a state of high-speed change during the operation of the computer and the device. This high-speed changing current state is also a convenient opening for electromagnetic wave radiation. Under various thrusts, electromagnetic radiation appears to be unprepared. Many hackers steal computer information through electromagnetic radiation, that is, electromagnetic radiation can cause leakage of computer information.

2. Computer network leaks

Computer network is an important stage in the history of computer development. Computers connected to the network can connect computers all over the world. Each user can make full use of a large amount of text, data and image data stored by each computer through their own terminals. The exchange of information brought about by computer networking and the integration of knowledge. However, since the data in the computer network structure is shared, there is a lot of information leakage vulnerability between the host and the user, and between the user and the user through the line.

First of all, the "data sharing" computer system implements the user identification password. Since the computer system recognizes the user and recognizes the "code" and does not recognize the "person", such unauthorized unauthorized users or thieves may pass the imposter and long-term Heuristics or other means to steal the user's password, and then enter the networked information system for stealing. Secondly, after computer networking, the transmission lines are mostly composed of carrier lines and microwave lines, which greatly increases the channel and range of computer leaks. The more convenient the conditions for intercepting the transmitted signals are, the thieves only need to be on any branch channel in the network. Or a node or terminal intercepts, and the information transmitted by the entire network can be obtained.

3. Computer media leaks

More and more secret data and archives are stored in computers. A large number of secret files and materials are turned into magnetic media and optical media. They are stored in unprotected media, and the hidden danger of media is quite large.

To be cocontinued in part 2.