Vous êtes sur la page 1sur 3

IPASJ International Journal of Information Technology (IIJIT)

Web Site: http://www.ipasj.org/IIJIT/IIJIT.htm


Email:editoriijit@ipasj.org
ISSN 2321-5976

A Publisher for Research Motivation ........

Volume 3, Issue 10, October 2015

Equipment Security Inspection


Zengtang Qu
Liaoning Police Academy, Dalian Liaoning, China

ABSTRACT
In this paper, through the analysis of the security incident caused by the printer, the paper puts forward the safety detection of
imported equipment. The devices here include: intelligent and unintelligent devices, the use of a wide range of important
equipment; here the safety testing, including information security and health security, etc. The specific contents include: the
establishment of equipment safety testing organization, the establishment of computer and IO equipment safety testing
organization, the establishment of computer IO equipment safety testing standards, the establishment of mobile security testing
standards, the establishment of intelligent equipment safety testing standards, the establishment of equipment to affect human
health safety testing standard; And stressed the need to strengthen the core technology independent development and
construction of equipment safety law.

Keywords: Import equipment security inspection; information system security; national security

1. INTRODUCTION
In 2014, China set up the National Security Council, Xi Jinping is the chairman. In the same year, [1] the Network
Security and Information Technology leadership team is also establish, Xi Jinping, the head of the team.[2]It fully
reflects that the security situation is severe. And significantly emphasize by Nation, the internet security is of massive
important.
In October of the same year, the eighth session of the Fourth Plenary Session proposed, comprehensively implement the
rule of law, the overall goal is to construct Chinese characteristic socialist legal system, and to construct socialism
country under the rule of law.[3] Security of equipment directly affects the social order, should enhance equipment's
safety checking standards and legal system construction.
About public safety, Xi Jinping stressed that at present, public security incident prone to multiple, and maintaining
public security tasks are onerous. Comprehensive front of political science and law to actively adapt to the new
situation, enhance risk awareness, adhere to multi-party participation, cooperation and sharing, risk sharing, insist on
leading technology, guarantee the rule of law, cultural support, innovate ideas, system and mechanism, methods and
means, to elaborate the public security work, Promotion of information technology, the rule of law, continue to improve
maintenance of public security capability, prevent, resolve and control all kinds of risks effectively , and strive to build
China Ping An [4]

2. IRAQ PRINTER INCIDENT


Well before the outbreak of the Gulf War, the Iraqi army diverted to the Jordan, from the Western imported a number
of advanced printing equipment, this information was also intercepted by offensive countries. Offensive countries
immediately sent spies sneaking into Jordan, replaced the chip of printers. Subsequently, these printers was imported
into Iraq, and connected to the Iraqi military computer. Before the war, attackers used remote control device to activate
the chip of printers, Iraq's prevention and control system completely paralyzed, in this case, Iraq can only look at
hostile air force attack his vital parts by bombing, but have no method to resist. [5]

3. EVENT ANALYSIS
Under normal circumstances, the program in the computer has security monitoring; According to the event, we can
infer that the chip can send and receive wireless signal, and the program in the chip is the program in the IO device. In
general, in the IO device, there is no security checking procedures, this is the first matter.
The printer has the function of receiving radio signals, and finally in the course of the war, the offensive countries use
the remote control, which is the second matter; It also shows that the printer or IO devices do not equip wireless signal
detection system, which is the third matter. The devices were purchased by Iraq without alert before the war, this is the
fourth matter.
The purchase of printers from other countries, it suggests that no advanced printer or equipment in Iraq, this is the lack
of independent research and development ability, this is the fifth matter.

Volume 3, Issue 10, October 2015

Page 1

IPASJ International Journal of Information Technology (IIJIT)


A Publisher for Research Motivation ........

Volume 3, Issue 10, October 2015

Web Site: http://www.ipasj.org/IIJIT/IIJIT.htm


Email:editoriijit@ipasj.org
ISSN 2321-5976

4. EQUIPMENT SECURITY INSPECTION PROGRAM


In view of the above problems, a concrete solution and suggestions are listed below.
4.1 Establish equipment safety testing organizations
Organization is power. The organization will have long-term, normalized and methodical work. In order to reduce the
equipment for the safety hidden danger of individual, collective and country, it is necessary to establish the equipment
inspection organizations.
4.2 The establishment of computers and IO equipment security inspection organization
Because the computer's IO equipment and computer are connected, most computers are connected to the Internet, the
core technology of the Internet is controlled in individual countries, the international and domestic security situation is
very grim, must be organized to establish security inspection standards, in order to protect network security, personal
security and national security.
4.3 The establishment of security inspection standards for computers and IO equipment
For different industries, different areas and different levels of security detection and corresponding countermeasures
(including encryption and shielding, etc.), security checking projects including software, hardware, wireless,
mechanical and electronic, etc. The security includes information security, network security and personal safety.
Personal Safety here means the effect to human's brain, body and psychology.
4.4 Set up mobile phone security inspection standards
The mobile phone is a kind of intelligent device, which is widely used, and its function is becoming more and more
powerful, more and more abundant; the volume is smaller and smaller; the applications installed in computers in past
are very convenient to install and use in modern smart phones. These facilitate people's life. But at the same time, these
endanger national security and personal privacy. We must develop security checking program which contra pose mobile
phone operation systems and applications.
4.5 Set up the standard for security inspection of intelligent equipment
Due to the continuous improvement of intelligent devices, continuous miniaturization of devices which have various
functions, and due to equipment's wired and wireless network is widely used, for wireless and wired security checking,
functional security checking, software and hardware security checking must strengthen security inspection of
standardized design and implementation, such as imported cars, forklifts and trenching machine, all of them are smart
devices. Equipment security checking involves security of individual, enterprise and nation, which must be paid
attention to.
4.6 Important points of attention
Before a war, in the course of a war and other important process, when we need import crucial materials and
equipment, we must be careful and enhance security checking.
4.7 Establish equipment affect human health safety testing standards
Some devices can produce radio signals, using low frequency and high frequency or microwave wireless signals have
many therapeutic apparatus affect human health, it is enough to show some equipment can affect the health of human
beings, this influence can enhance health, also can damage health, therefore, must establish safety inspection standard
equipment affect human health, in it, including damage to the environment safety testing standards.

Volume 3, Issue 10, October 2015

Page 2

IPASJ International Journal of Information Technology (IIJIT)


A Publisher for Research Motivation ........

Volume 3, Issue 10, October 2015

Web Site: http://www.ipasj.org/IIJIT/IIJIT.htm


Email:editoriijit@ipasj.org
ISSN 2321-5976

4.8 Independent development of core technology


In aspect of the important core technology, products and weapons etc. we must have independence, self-reliance, hard
work, organization, and support research and development systematically and chronically.
4.9 Pay attention to the construction of the legal system of the equipment security
The rule of law, the legal construction of security equipment is imperative under the situation. According to the
computer equipment and intelligent mobile phone equipment security checking standards, to take corresponding
formation of legal provisions, so equipment security detection and treatment have laws to judge by.
About the project support
In 2013, the national natural science fund project: "fuzzy inversion study the mechanism of neural network and the
number of crime dark space" (61272170).

References
[1] Third Plenary Session of the Communist Party of China's 18 communique,Nov.12,2013
[2] Central network security and Informatization Leading Group held its first meeting, Xinhua News Agency Beijing
February 27, 2014 Electric
[3] CPC Central Committee on Promoting the rule of law on Major Issues, Oct.23, 2014
[4] Continues to improve the level of public safety capacity to maintain the level of efforts to build peace China, the
people's daily, 2015 02 edition 24
[5] Zhi zhang. Secure Print, Journal of Print Today, pp.88-89, July, 2008.

AUTHOR
Zengtang Qu Graduated from Liaoning University of science and technology major in computer science
in 1984, received a bachelor's degree. From 1995 to now working in Liaoning police academy, main
research direction for application of computer and information security technology.

Volume 3, Issue 10, October 2015

Page 3

Vous aimerez peut-être aussi