| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GA/T 700-2007 | English | 219 |
Add to Cart
|
3 days [Need to translate]
|
Information security technology--Classification criterion for intrusion of computer network
| Obsolete |
GA/T 700-2007
|
PDF similar to GA/T 700-2007
Basic data | Standard ID | GA/T 700-2007 (GA/T700-2007) | | Description (Translated English) | Information security technology--Classification criterion for intrusion of computer network | | Sector / Industry | Public Security (Police) Industry Standard (Recommended) | | Classification of Chinese Standard | A90 | | Classification of International Standard | 35.240 | | Word Count Estimation | 5,585 | | Date of Issue | 2007-05-14 | | Date of Implementation | 2007-07-01 | | Issuing agency(ies) | Ministry of Public Security | | Summary | This standard specifies the detailed requirements for computer network intrusion classification. This standard is applicable to the design and implementation of network event related products. The testing and management of network intrusion can also refer to the use. |
GA/T 700-2007: Information security technology--Classification criterion for intrusion of computer network ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology - Classification criterion for intrusion of computer network
ICS 35.240
A90
People's Republic of China Public Security Industry Standards
Information security technology computer network intrusion grading requirements
Posted 2007-05-14
2007-07-01 implementation
People's Republic of China Ministry of Public Security
Foreword
This standard was proposed by the Ministry of Public Security Public Information Network Security Supervision Bureau.
This standard is under the jurisdiction of the Ministry of Public Security Information System Standardization Technical Committee.
This standard was drafted. Ministry of Public Security of Computer Information System Security Product Quality Supervision and Inspection Center.
Drafters of this standard. Shen Liang, Gu Jian.
Information security technology computer network intrusion grading requirements
1 Scope
This standard specifies the requirements for such a computer network intrusion classification.
This standard applies to the design and implementation of network events related products, to carry out the test network intrusion, management can also refer to use.
2 Terms and definitions
The following terms and definitions apply to this standard.
2.1
Protection systems and services from accidental or malicious destruction, the system can guarantee continuous and reliable to run properly, the network service is not
Interrupt.
2.2
Unintentional or malicious destruction of network security intrusion or an attempted intrusion behavior on the network.
2.3
Potential intruder, premeditated, unauthorized ability to render the system unreliable or unusable.
2.4
Information access and disclosure of licensing restrictions.
2.5
Information can be timely and reliable access.
2.6
Credible and complete information.
3 computer network intrusions
Network security by the confidentiality, availability and integrity of the three security attributes. Intruders use various means of network intrusion, straight
He received a threat to the safety of these three attributes.
3.1 Confidentiality
3.1.1 unauthorized access
3.1.1.1 monitor information
Use of an unauthorized intruder monitoring, interception and other means to secure the transmission of information in unprotected networks pose a threat. For example, network
In the presence of network protocol analysis tool.
3.1.1.2 Information Detection
Intruder using active means of access, there is a threat of unauthorized access to read the acquired information. According to the invaders want to get information
|