The Data Self-Destruction Technology Research Used in Marine Environmental Monitoring Buoy System

Article Preview

Abstract:

Faced up with the fact that the buoy used in marine environmental monitoring did not install the self-destruction mechanism, and combined with the current development of the data destruction technology, data self-destruction technology for buoy was researched. The study shows that when the buoy system is out of control, it can select the two different data self-destruction methods by analyze different degree of threat which buoy system suffered. So it can destruct the marine environmental factor data in a fast and effective way, and make the data be unrecovered, thereby prevent data leaks, ensure data security.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2195-2198

Citation:

Online since:

July 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] GB/T20984-2007, Information security technology information security risk assessment standard.

Google Scholar

[2] National security standard BMB17-2006, Involved graded protection technical requirements of state secrets information system.

Google Scholar

[3] National security standard BMB20-2007, Involved in management of standard classification protection of state secrets information system.

Google Scholar

[4] Di Tang, Ying Wei: submitted to Information security and technology (2012) In Chinese.

Google Scholar

[5] Jianfeng Wang: submitted to Network & Computer Security (2006) In Chinese.

Google Scholar

[6] Chengchen Zhang, Shuguang Zhang. Country-region China Patent CN20042003049. 8. 2005-06-01.

Google Scholar

[7] Shangyi Chen: submitted to CHINA INFORMATION SECURITY (2010) In Chinese.

Google Scholar

[8] US Department of Defense. DOD 5220. 22-M national industrial security operating manual (NISPOM). Washington: GPO, (1995), p.800.

Google Scholar

[9] Shaoping Li,Huaan Zhang, Pu-Ling Lu, Madsen, T. Sining Mao. Direct and reverse overwrite processes in perpendicular recording. IEEE Transactions on Magnetics, (2006), p.151.

DOI: 10.1109/tmag.2005.861773

Google Scholar

[10] Zhengtian Lu, Tao Li, Xiaoqing Hu: submitted to Application Research of Computers (2009) In Chinese.

Google Scholar