| 
           
             
       
   
   US$279.00 ยท In stock Delivery: <= 3 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 32925-2016: Information security technology -- Basic security requirements for networked computer terminal of government Status: Valid    
      
    
  
	
		
			| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF | 
		 
			| GB/T 32925-2016 | English | 279 | 
   Add to Cart
   | 
                    3 days [Need to translate]
                 | 
                    Information security technology -- Basic security requirements for networked computer terminal of government
                 | Valid | 
                    GB/T 32925-2016
                 | 
		 
	 
     
     
  
	 
       PDF similar to GB/T 32925-2016 
    
   
    
     
          
  
  
    
  Basic data             |  Standard ID  |          GB/T 32925-2016 (GB/T32925-2016) |               |  Description (Translated English)  |          Information security technology -- Basic security requirements for networked computer terminal of government |               |  Sector / Industry  |          National Standard (Recommended) |               |  Classification of Chinese Standard  |          L80 |               |  Classification of International Standard  |          35.040 |               |  Word Count Estimation  |          14,127 |               |  Date of Issue  |          2016-08-29 |               |  Date of Implementation  |          2017-03-01 |               |  Regulation (derived from)  |          National Standard Announcement 2016 No.14 |               |  Issuing agency(ies)  |          General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China |         
  GB/T 32925-2016: Information security technology -- Basic security requirements for networked computer terminal of government ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.  
Information security technology - Basic security requirements for networked computer terminal of government
ICS 35.040
L80
National Standards of People's Republic of China
Information Security Technology Government Networking Computer Terminals
Basic requirements for safety management
2016-08-29 released
2017-03-01 implementation
General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China
China National Standardization Management Committee released
Directory
Preface III
Introduction IV
1 Scope 1
2 normative reference document 1
3 Terms and definitions 1
4 acronym 1
5 Computer terminal security overall requirements 1
5.1 Security policy development 1
5.2 Safety requirements 2
5.3 Document Management Requirements 2
6 staff management requirements 2
6.1 roles and responsibilities 2
6.2 job management and training 2
6.3 Temporary Visitor Management 2
7 Asset Management Requirements 3
7.1 Purchasing 3
7.2 Registration and Use Maintenance 3
7.3 Scrap and disable 3
8 Software management requirements 3
8.1 Software Installation 3
8.2 operating system configuration management 4
8.3 Application Software Configuration Management 4
8.3.1 Web browser 4
8.3.2 Mail client software system 4
8.3.3 Document editing software 4
8.4 Security Protection Software Configuration Management 5
9 access security requirements 5
9.1 Network access 5
9.2 Media access 5
10 Operational safety requirements 5
10.1 Unified management 5
10.2 Monitoring Audit 5
10.2.1 Operating System Audit 5
10.2.2 Traffic monitoring 6
10.2.3 software vulnerability scanning 6
10.3 backup management 6
10.4 Information Security Event Management 6
10.5 supervision and inspection 6
10.6 Exceptional disposal 6
Appendix A (Normative Appendix) Government Networking Computer Terminal Security Enhancement Requirements 7
Appendix B (informative) Government Interconnection Computer Terminal Safety Management System Elements 9
Foreword
This standard is drafted in accordance with the rules given in GB/T 1.1-2009.
This standard is proposed by the Ministry of Industry and Information Technology.
This standard is nationalized by the National Information Security Standardization Technical Committee (SAC/TC260).
The drafting of this standard. Beijing Information Security Evaluation Center, the National Computer Network Emergency Technology Coordination Center, the Chinese Academy of Sciences soft
Research Institute, China Railway Corporation Transportation Bureau Information Department, Heilongjiang Province Information Security Evaluation Center, Beijing Shijingshan District Economy and Information
Of the Committee, Beijing Pengchuang World Technology Co., Ltd., Huangshan municipal government information office, Beijing Municipal Bureau of Statistics Center.
The main drafters of this standard. Liu Haifeng, Qian Xiu Penang, Wang Chunjia, Zhao Zhangjie, Zhang Xiaomei, Liang Bo, Li Chenyang, He Hai, Sun Yongsheng,
Su Pu - rong, Liu Jun, Huang Junqiang, Wang Yanchun, Li Xiaoyong, Cao Weidong, Wang Xiaolu, Qiang Qian, Wang Xizhong, Song Chaochen, Lu Yueqing, Shi Rong
Introduction
This standard is GB/T 29245-2012 "information security technology government information security management basic requirements" within the framework of the government
Door information security security standard system components, used to guide all levels of government departments within the jurisdiction of the network within the computer terminal management
And safety inspection work, so that it has a certain degree of security protection. This standard can be used with a variety of specific computer terminal application scenarios, operating system
Use the configuration guide with the application software. In addition, the government departments according to their own characteristics, in accordance with the "comprehensive protection" "moderate protection"
The principle of choice to use, to meet the basic requirements, based on the implementation of the implementation of Appendix A to enhance the safety requirements to further improve the sector
The level of security of the computer terminal.
Information Security Technology Government Networking Computer Terminals
Basic requirements for safety management
1 Scope
This standard specifies the security requirements of government departments for networked computer terminals.
This standard applies to government departments to carry out network computer terminal security configuration, use, maintenance and management work.
2 normative reference documents
The following documents are indispensable for the application of this document. For dated references, only the dated edition applies to this article
Pieces. For undated references, the latest edition (including all modifications) applies to this document.
Information security - Technical information systems - Safety level - Basic requirements for protection GB/T 22239-2008
Information security technical terminology GB/T 25069-2010
Information security technology - Basic requirements for information security management of government departments GB/T 29245-2012
3 terms and definitions
GB/T 25069-2010 Definitions and the following terms and definitions apply to this document.
3.1
Computer terminal computerterminal
For the use of personal daily office, can independently carry out data processing and provide network services to visit the desktop micro-computer system, portable micro
Type computer system, thin client system or virtual terminal system, does not include intelligent mobile terminals (such as handheld computers, smart mobile phones, etc.).
3.2
Networked networked
Connect the government to the office.
4 abbreviations
The following abbreviations apply to this document.
BIOS. Basic input and output system (BasicInputOutputSystem)
CPU. central processor (CentralProcessingUnit)
IP. Interconnection between networks (InternetProtocol)
MAC. Media Access Control (MediaAccessControl)
USB. Universal Serial Bus (UniversalSerialBus)
5 Computer terminal security overall requirements
5.1 Security policy development
The security policy of the networked computer terminal should be an important part of the overall information security strategy of the unit and the information security of the unit
   
   
  
  
    
  Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 32925-2016_English be delivered?Answer: Upon your order, we will start to translate GB/T 32925-2016_English as soon as possible, and keep you informed of the progress. The lead time is typically 1 ~ 3 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GB/T 32925-2016_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 32925-2016_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs):  List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to  [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.  
        
   
        
       
          
               
 
          |