GB/T 35281-2017 English PDFUS$279.00 · In stock
Delivery: <= 3 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 35281-2017: Information security technology -- Security technique requirements for application servers in mobile internet Status: Valid
Basic dataStandard ID: GB/T 35281-2017 (GB/T35281-2017)Description (Translated English): Information security technology -- Security technique requirements for application servers in mobile internet Sector / Industry: National Standard (Recommended) Classification of Chinese Standard: L80 Classification of International Standard: 35.040 Word Count Estimation: 14,176 Date of Issue: 2017-12-29 Date of Implementation: 2018-07-01 Regulation (derived from): National Standards Bulletin 2017 No. 32 Issuing agency(ies): General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China GB/T 35281-2017: Information security technology -- Security technique requirements for application servers in mobile internet---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order. Information security technology - Security technique requirements for application servers in mobile internet ICS 35.040 L80 National Standards of People's Republic of China Information Security Technology Mobile Internet Application server security technology requirements 2017-12-29 Posted 2018-07-01 implementation General Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China China National Standardization Administration released Directory Preface Ⅰ Introduction Ⅱ 1 Scope 1 2 Normative references 1 3 Terms and Definitions, Abbreviations 1 4 asset classification 2 4.1 Equipment Assets 2 4.2 System Assets 2 4.3 Business assets 2 4.4 User Data Assets 2 5 Security Framework 3 6 Data Security 3 6.1 Data self-safety 3 6.2 Data Protection Security 3 7 Business Security 4 7.1 Business Security 4 7.2 General Business Security 4 7.3 Specific Business Security 4 8 system security 5 8.1 Operating System Security 5 8.2 middleware security 5 8.3 Database Security 6 Equipment safety 6 10 protocol security 6 10.1 standard protocol security 6 10.2 Private Protocol Security 6 11 operation and maintenance safety 6 11.1 Security Configuration 6 11.2 Safety Monitoring 6 11.3 Security Audit 7 11.4 Malicious Code Protection 7 11.5 Backup and Recovery 7 Appendix A (Informative) Security Risk Analysis 8 Reference 10 ForewordThis standard was drafted in accordance with the rules given in GB/T 1.1-2009. Please note that some of this document may be patentable. The issuing agencies of this document do not bear the responsibility of identifying these patents. This standard by the National Information Security Standardization Technical Committee (SAC/TC260) and focal point. This standard was drafted by China Institute of Information Communications, Zhejiang Ant micro-financial services Group Co., Ltd., China Mobile Communications Group, Guangdong Research Institute of China Telecom Co., Ltd., Beijing University of Posts and Telecommunications. The main drafters of this standard. Pan Juan, Ninghua, Chen Hong Ji, Liu Tao, Zhai Shijun, fall Hongwei, Zhang Bin, Jinhua Min, Xu Guoai, Qiu Qin.IntroductionMobile Internet application server hosting a variety of mobile applications, involving many valuable and sensitive information resources, so easy to become The target of the attack. As mobile internet applications become increasingly dependent on online services, the importance of application servers also increases over the days Increased, if there is a security issue, ranging from a large number of users to make normal use of mobile Internet applications provide a wide range of business, but may be Can lead to large-scale disclosure of user information and other security risks. This standard is mainly aimed at mobile Internet application server security technology requirements, through the application of server security standards to achieve and operation and maintenance, Strengthen the server-side technology and management of security level, improve the security architecture of the entire mobile Internet to ensure that user rights and interests are not compromised, to maintain production Industry in an orderly and healthy development. Information Security Technology Mobile Internet Application server security technology requirements1 ScopeThis standard specifies the mobile Internet application server security technology requirements, including data security, business security, system security, equipment security Full, protocol security and operation and maintenance security. This standard applies to support carrying various types of mobile Internet applications, computer systems can be used to guide the mobile Internet application services Development, deployment, management and maintenance and test evaluation, but also for related products, testing and services.2 Normative referencesThe following documents for the application of this document is essential. For dated references, only the dated version applies to this article Pieces. For undated references, the latest edition (including all amendments) applies to this document. Information security technology Information systems - General requirements for safety technology GB/T 20271-2006 Information security technology Operating system security technology requirements Information security technology Server security technology requirements Information technology - Security terminology Information security technology Cloud computing service security capability requirements JR/T 0095-2012 China Financial Mobile Payment Application Security Specification 3 Terms and Definitions, Abbreviations 3.1 Terms and definitions GB/T 25069-2010 defined and the following terms and definitions apply to this document. 3.1.1 Mobile internet mobileinternet Users use mobile terminals (including mobile phones, netbooks, tablets, smartbooks, etc.) to obtain mobile communication network services through the mobile network And Internet service open basic telecommunication network. 3.1.2 Mobile internet application server mobileinternetapplicationservers A computer system for providing mobile Internet services to mobile terminals consists of a supporting system (eg hardware, operating system, middleware, database management Management system, WEB services, etc.) and business applications. 3.1.3 Mobile smart terminal mobilesmartterminal Access to the mobile communications network, with an open operating system that provides an application development interface and the ability to install and run applications Piece of mobile terminal. 3.2 Abbreviations The following abbreviations apply to this document. ......Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 35281-2017_English be delivered?Answer: Upon your order, we will start to translate GB/T 35281-2017_English as soon as possible, and keep you informed of the progress. The lead time is typically 1 ~ 3 working days. The lengthier the document the longer the lead time.Question 2: Can I share the purchased PDF of GB/T 35281-2017_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 35281-2017_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay. |