Académique Documents
Professionnel Documents
Culture Documents
ABSTRACT
In this paper, through the analysis of the security incident caused by the printer, the paper puts forward the safety detection of
imported equipment. The devices here include: intelligent and unintelligent devices, the use of a wide range of important
equipment; here the safety testing, including information security and health security, etc. The specific contents include: the
establishment of equipment safety testing organization, the establishment of computer and IO equipment safety testing
organization, the establishment of computer IO equipment safety testing standards, the establishment of mobile security testing
standards, the establishment of intelligent equipment safety testing standards, the establishment of equipment to affect human
health safety testing standard; And stressed the need to strengthen the core technology independent development and
construction of equipment safety law.
Keywords: Import equipment security inspection; information system security; national security
1. INTRODUCTION
In 2014, China set up the National Security Council, Xi Jinping is the chairman. In the same year, [1] the Network
Security and Information Technology leadership team is also establish, Xi Jinping, the head of the team.[2]It fully
reflects that the security situation is severe. And significantly emphasize by Nation, the internet security is of massive
important.
In October of the same year, the eighth session of the Fourth Plenary Session proposed, comprehensively implement the
rule of law, the overall goal is to construct Chinese characteristic socialist legal system, and to construct socialism
country under the rule of law.[3] Security of equipment directly affects the social order, should enhance equipment's
safety checking standards and legal system construction.
About public safety, Xi Jinping stressed that at present, public security incident prone to multiple, and maintaining
public security tasks are onerous. Comprehensive front of political science and law to actively adapt to the new
situation, enhance risk awareness, adhere to multi-party participation, cooperation and sharing, risk sharing, insist on
leading technology, guarantee the rule of law, cultural support, innovate ideas, system and mechanism, methods and
means, to elaborate the public security work, Promotion of information technology, the rule of law, continue to improve
maintenance of public security capability, prevent, resolve and control all kinds of risks effectively , and strive to build
China Ping An [4]
3. EVENT ANALYSIS
Under normal circumstances, the program in the computer has security monitoring; According to the event, we can
infer that the chip can send and receive wireless signal, and the program in the chip is the program in the IO device. In
general, in the IO device, there is no security checking procedures, this is the first matter.
The printer has the function of receiving radio signals, and finally in the course of the war, the offensive countries use
the remote control, which is the second matter; It also shows that the printer or IO devices do not equip wireless signal
detection system, which is the third matter. The devices were purchased by Iraq without alert before the war, this is the
fourth matter.
The purchase of printers from other countries, it suggests that no advanced printer or equipment in Iraq, this is the lack
of independent research and development ability, this is the fifth matter.
Page 1
Page 2
References
[1] Third Plenary Session of the Communist Party of China's 18 communique,Nov.12,2013
[2] Central network security and Informatization Leading Group held its first meeting, Xinhua News Agency Beijing
February 27, 2014 Electric
[3] CPC Central Committee on Promoting the rule of law on Major Issues, Oct.23, 2014
[4] Continues to improve the level of public safety capacity to maintain the level of efforts to build peace China, the
people's daily, 2015 02 edition 24
[5] Zhi zhang. Secure Print, Journal of Print Today, pp.88-89, July, 2008.
AUTHOR
Zengtang Qu Graduated from Liaoning University of science and technology major in computer science
in 1984, received a bachelor's degree. From 1995 to now working in Liaoning police academy, main
research direction for application of computer and information security technology.
Page 3