| 
           
             
       
   
   US$1199.00 · In stock Delivery: <= 6 days. True-PDF full-copy in English will be manually translated and delivered via email. GA/T 1539-2018: (Information security technology Network virus monitoring system security technical requirements and test evaluation methods) Status: Valid    
      
    
  
	
		
			| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF | 
		 
			| GA/T 1539-2018 | English | 1199 | 
   Add to Cart
   | 
                    6 days [Need to translate]
                 | 
                    (Information security technology Network virus monitoring system security technical requirements and test evaluation methods)
                 | Valid | 
                    GA/T 1539-2018
                 | 
		 
	 
     
     
  
	 
       PDF similar to GA/T 1539-2018 
    
   
    
     
          
  
  
    
  Basic data             |  Standard ID  |          GA/T 1539-2018 (GA/T1539-2018) |               |  Description (Translated English)  |          (Information security technology Network virus monitoring system security technical requirements and test evaluation methods) |               |  Sector / Industry  |          Public Security (Police) Industry Standard (Recommended) |               |  Classification of Chinese Standard  |          L80 |               |  Classification of International Standard  |          35.040 |               |  Word Count Estimation  |          48,431 |               |  Date of Issue  |          2018-12-27 |               |  Date of Implementation  |          2018-12-27 |               |  Issuing agency(ies)  |          Ministry of Public Security |         
  GA/T 1539-2018: (Information security technology Network virus monitoring system security technical requirements and test evaluation methods) ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.  
(Information security technology Network virus monitoring system security technical requirements and test evaluation methods)
ICS 35.040
L80
Public Safety Industry Standards of the People's Republic of China
Information Security Technology
Network virus monitoring system
Safety technical requirements and test evaluation methods
2018-12-27 release
2018-12-27 Implementation
Issued by the Ministry of Public Security of the People's Republic of China
Contents
Foreword Ⅲ
1 Scope 1
2 Terms and definitions 1
3 Acronyms 2
4 Network virus monitoring system description 3
5 Technical requirements 3
5.1 General description 3
5.2 Functional requirements 3
5.3 Safety requirements 8
5.4 Security requirements 11
5.5 Performance requirements 17
6 Test and evaluation methods 17
6.1 General description 17
6.2 Functional test 17
6.3 Security testing 28
6.4 Security Assurance Evaluation 34
6.5 Performance testing 40
Appendix A (Informative Appendix) Network Virus Monitoring System Operating Environment and Mode 41
Appendix B (Informative Appendix) Test Environment and Tools for Network Virus Monitoring System 42
References 44
Foreword
This standard was drafted in accordance with the rules given in GB/T 1.1-2009.
This standard was proposed by the Cyber Security Bureau of the Ministry of Public Security.
This standard is under the jurisdiction of the Information System Security Standardization Technical Committee of the Ministry of Public Security.
This standard was drafted by. National Computer Virus Emergency Response Center, Seventh Bureau of the 11th Bureau of the Ministry of Public Security, Information Industry Information Security Evaluation Center,
National Information Center, Tianjin Public Security Bureau Network Security Corps, Beijing University of Technology, Beijing Rising Information Technology Co., Ltd., Beijing Antiy
Network Security Technology Co., Ltd., Beijing Venus Star Information Security Technology Co., Ltd., Hengan Jiaxin (Beijing) Technology Co., Ltd., Beijing God
Lvzhou Information Security Technology Co., Ltd., Beijing Tianrongxin Technology Co., Ltd.
The main drafters of this standard. Chen Jianmin, Du Zhenhua, Zhang Junbing, Lu Lei, Cao Peng, Zhang Zhe, Zhang Rui, Liu Yan, Huang Yibin, Li Dong, Meng Bin,
Zhang Xin, Liu Jian, Lu Kai, Wang Guan, Wang Shiyu, Ye Rongjun, Zhao Huanju, Yang Shaobo, Xu Yuqing, Cui Tingting, Jiao Yufeng, Wang Yan.
Information Security Technology
Network virus monitoring system
Safety technical requirements and test evaluation methods
1 Scope
This standard specifies the functional requirements, safety requirements, performance requirements and safety assurance requirements of the network virus monitoring system, and gives the test
Evaluation method.
This standard applies to the design, development and testing of network virus monitoring systems.
2 Terms and definitions
The following terms and definitions apply to this document.
2.1
Network virus monitoring system virusdetectionsystem
Use the bypass mode to listen to the data packets in the network and analyze them to find the system that spreads the virus and related behaviors in the network.
2.2
Virus
A computer program or agent that can affect the integrity, availability, controllability, and confidentiality of computer operating systems, applications, and data
Codes include malicious programs such as file viruses, worms, Trojan horse programs, macro viruses, and script viruses.
2.3
Viruscapture
In order to retain virus or suspected virus samples and infected files, the network virus monitoring system will capture the corresponding files from the network
The processing method stored in a specific restricted storage space.
2.4
Internal network
Trusted or protected areas isolated by firewall/network virus monitoring system.
2.5
External network
Untrusted or unprotected areas isolated by firewall/network virus monitoring system.
2.6
Wire speed
The maximum forwarding rate theoretically achieved by the network environment monitored by the network virus monitoring system.
2.7
Peak load
The ability of the network virus monitoring system to process monitoring data without packet loss is generally at the line speed (or pass rate) that can be achieved
Expressed as a percentage.
2.8
Malicious URL
The resource pointed to contains the URL of the virus.
   
   
  
  
    
  Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GA/T 1539-2018_English be delivered?Answer: Upon your order, we will start to translate GA/T 1539-2018_English as soon as possible, and keep you informed of the progress. The lead time is typically 4 ~ 6 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GA/T 1539-2018_English with my colleagues?Answer: Yes. The purchased PDF of GA/T 1539-2018_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs):  List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to  [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.  
        
   
        
       
          
               
 
          |