time:2024-10-06 16:02:52 Smart Hardware
Reference content 1:
1. Electromagnetic wave radiation leakage is a type of transmission and emission, which is radiated through power lines and signal lines. The other is due to the strong electromagnetic radiation of computers, processors, and displays in the equipment. The calculation works by a high-frequency pulse circuit, and due to the change in the electromagnetic field, electromagnetic waves must be radiated outward. These electromagnetic waves will bring out the information in the computer, and criminals can receive the electromagnetic waves as long as they have the appropriate receiving equipment, and steal secret information from them. According to foreign tests, it can receive and restore the information of the computer display terminal at a distance of 1,000 meters, and see it very clearly. When the microcomputer is working, it can receive a radiated signal with a listening device at a distance of 100 meters from it in an open area.
2. Leakage caused by the networking of information systems Because the data in the computer network structure is shared, there are many leakage vulnerabilities between the host and the user, and between the user and the user through the line connection. (1) After computers are networked, most of the transmission lines are composed of carrier lines and microwave lines, which greatly increases the channels and scope of computer leakage. The larger the network, the more branch the line channel
Reference content 2:
1) Natural and irresistible factors: Earthquakes, fires, floods, storms, social violence or wars, etc., which will directly endanger the security of information system entities.
2) Hardware and physical factors: refers to the safety and reliability of the system hardware and environment, including the security of computer room facilities, computer subjects, storage systems, auxiliary equipment, data communication facilities and information storage media.
Reference content 3:
(1) Computer hardware
(2) Operating system
(3) Databases
Reference content 4:
1) Natural and force majeure factors: earthquakes, fires, floods, storms, social violence or wars, etc., which will directly endanger the security of the information system entity.
2) Hardware and physical factors: refers to the system hardware...
《Factors influencing the security of information systems》 This does not represent the views of this website. If there is any infringement, please contact us to delete it.
Latest article
How to change wallpaper on OPPOA1
How to charge the Redmi K60 Ultra wirelessly
OPPOK11x how to turn off charging vibration
Does Realme GT5 have a telephoto lens
The Huawei phone turns off the charging full prompt sound
Redmi Note 11SE Replacement Wallpaper Tutorial
Which of the Honor Magic5 series is equipped with a separate display chip
Where is the volume button for the camera of a Huawei phone
Xiaoai speaker universal remote control version
Spectrometer adjustment experiment report
How to connect the small dolphin outdoor camera PTZ version
RedmiK60Ultra how to take a long screen picture
The difference between Battlefield V Definitive Edition and Standard Edition
How long does it take for the Redmi K60E to be fully charged
vivo X Fold+ step counting walking flowering wallpaper setting tutorial introduction
K30 battery correction virtual current method
How to set up phone transfer on Xiaomi 13Pro
How to turn off the shutter sound of the Apple 13 photo
Huawei Mate60 Pro screen off shows how to turn it off
Introducing the OPPO Reno 10 Pro processor
Digital Insights