Friday, May 18, 2012

The design enhances the portability of green laser pointer

Physical security in the entire computer network information system security plays an important role, but also other security measures are implemented and to play a normal role in the foundation and prerequisite conditions. 2, which consists mainly of physical security aspects? (2.1) 3, computer room security level classification criteria? (2.1.1) 4, the main computer room security technology includes what aspects? (2.1.1) 5, lines of communication security technology to protect the main technical measures what? cable compression technology such as fiber-optic communication lines to the anti-eavesdropping technology (distance greater than the maximum length of the systems, do not use fiber-optic communication line; The one-piece design of green laser pointer saves space and enhance its portability as well.to strengthen the security of replicator, such as the use of pressurized cable, alarm systems and to strengthen security and other measures) 6, the electromagnetic radiation on the network communication security is mainly reflected in what areas, what protective measures? Mainly reflected in: the computer system by electromagnetic radiation may be intercepted and the information is compromised, the computer system data spread in space. Protective measures: one is the conducted emission protection, mainly by power lines and signal lines for good performance of the filter installation, reducing the transfer impedance and cross-coupling between the wires; the other is a radiation protection, and sub- into two: one is the use of electromagnetic shielding measures, the second is the interference protection measures. The one-piece design of green laser pointer can effectively prevent the loss phenomenon of components.To improve anti-jamming capability of electronic equipment, shielding the main measures.  Filter isolated ground, which is the most widely used method of shielding. Electromagnetic shielding mainly through the above measures to improve the computer's electromagnetic compatibility, improved equipment, anti-jamming capability, the computer can resist the strong electromagnetic interference, while the computer to minimize the emission of electromagnetic leakage, so as not to be useful information leak out. 7, to protect the information stored in the main safety measures have? (P52) ① disk storage of data, should be properly kept; ② data on the hard drive, to establish an effective level of authority, and strict management, necessary encryption to ensure security of data; ③ disk data storage, management must to the people, and registration; ④ store important data on the disk to back up two and two sub-custodian; ⑤ printing paper with business data, to be treated as file management; The green laser led contains a shortcut key on the surface.⑥ who exceed the data retention period to be After removal of special data processing; ⑦ does not record any data disk, to be confirmed by tests carried out by hand the destruction, and do the registration; ⑧ effective in need of long-term preservation of data, quality assurance should be conducted during the dump, and assurances to keep the content correct. "Computer Network Security" Crosstalk notes (3) 8, outlining various types of computer room of the power system requirements. (P53) power system security should be noted that fluctuations in supply current or voltage may cause harm to a computer network system. A, B class security room requirements, C, safe room requirements. Chapter information encryption and PKI encryption technology is the use of information principles and methods of cryptography to protect data on the means of transmission, it is based on mathematical calculations, information theory and complexity theory is the two important components. The green laser pointer contains a shortcut key for full screen displaying.Cryptography course of development has gone through three stages: ancient encryption method, classical and modern password password. 3.1.2 The basic concepts of cryptography: Cryptography as a branch of mathematics is to study the science of information systems security is password coded and cryptanalysis learn collectively.

No comments:

Post a Comment