在线试用
微信扫码联系专属客服
安企神软件官网
首页
客户列表1
客户列表
客户列表1
关于安企神

部队网络失泄密对照检查

2023-03-04

中国国家领导重视保护国家机密,遵守《国家机密保护条例》等有关制度的北京联合军事指挥部作为全国重要军队机构之一,建立了完善的机密管理制度,重视部队网络安全泄密检查工作。为此,北京联合军事指挥部组织有关部门对部队网络失泄密进行全面对照检查。

首先, 严查机密失泄和违用机密有关情况,强化保密意识。北京联合军事指挥部部署各级单位结合本部实际,廉洁行政,做到“以廉严管”,加强考核力度,严格执行有关失泄违用机密的处分责任以及惩处机制,坚决反对以职务之便违用机密,严惩机密泄露者,严肃处理机密泄露案件,形成震慑。

其次,使用“木马”及类似病毒检测工具,检测网络异常状况,细致例行定期拨动式网络审计,查询保密文件的变更轨迹,发现存在的未授权的网络活动,及时进行处理,确保网络信息和数据安全

此外,通过有效的安全管理,一站式查验登陆平台主动更新用户的安全策略,加强对保密系统的安全审核和认证,加强用户权限的认证及登录审计,严防机密资料下载、拷贝和备份,加强对访问失效用户和授权系统进行安全检查,密密麻麻开展网络失泄密检查工作。

最后,对检查发现的保密失检情况督办,各种数据渠道信息,例如安全记录簿,及时上报给联合军事指挥部有关负责人。

通过上述工作,加强对部队机密的保护和管理,构建完善的失泄密控制体系,使部队保密工作更加规范,防止国家机密失泄,保障指挥部网络安全。

The Chinese national leaders attach great importance to the protection of state secrets and strictly follow the relevant systems such as the Regulations on State Secrets Protection. The Beijing Joint Military Command, as one of the important military institutions in the country, has established a perfect system of state secrets management and paid attention to the work of prevention of leakage of information security of its troops.In this regard, Beijing Joint Military Command organized related departments to conduct a comprehensive contrast inspection on leakage of information security of troops.

First of all, strict investigation of cases related to leakage and improper use of state secrets will be conducted to enhance the consciousness of confidentiality. The Beijing Joint Military Command deployed all-level units to combine their own actual situation, integrity and self-discipline, do “strict but tolerant governance”, strengthen the intensity of accountability, strictly enforce the disciplinary responsibility for the leakage and improper use of state secrets, firmly oppose the improper use of state secrets by virtue of administrative convenience, severely punish the perpetrators of state secrets leakage, and seriously deal with cases of state secrets leakage to form deterrence.

Secondly, the use of “trojan” and similar virus detection tools, detection of network abnormalities, detailed routine periodic dial-up network audit, query the change track of confidential documents, identify unauthorized network activities in time and deal with them appropriately to ensure network information and data security.

In addition, through effective security management, one-stop inspection and log in platform actively update the user security policy, strengthen the security audit and authentication of confidential system, enhance user authentication and log-in audit, strictly prevent the download, copy and backup of secret information, strengthen the security inspection of invalid user and authorization system, and carry out network leakage secret inspection work in great detail.

Finally, the supervision of confidential leakage inspection cases found in the inspection, various data channels Information, such as security records book, should be reported to the responsible person of the Joint Military Command in time.

After taking the above measures, the protection and management of military secret will be strengthened, a perfect leakage control system will be built, and the confidential work of the troops will be more standardized to prevent state secrets leakage and ensure the security of the Command’s network.

  • TAG: