Home Cart Quotation About-Us
www.ChineseStandard.net
SEARCH

GBZ41290-2022 English PDF

US$339.00 ยท In stock
Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email.
GBZ41290-2022: Information security techniques - Guidelines for mobile internet security audit
Status: Valid
Standard IDUSDBUY PDFLead-DaysStandard Title (Description)Status
GB/Z 41290-2022339 Add to Cart 4 days Information security techniques - Guidelines for mobile internet security audit Valid

Similar standards

GB/T 41819   GB/T 41871   GB/T 41479   GB/T 19713   GB/Z 41288   

Basic data

Standard ID: GB/Z 41290-2022 (GB/Z41290-2022)
Description (Translated English): Information security techniques - Guidelines for mobile internet security audit
Sector / Industry: National Standard
Classification of Chinese Standard: L80
Word Count Estimation: 17,191
Issuing agency(ies): State Administration for Market Regulation, China National Standardization Administration

GBZ41290-2022: Information security techniques - Guidelines for mobile internet security audit

---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
GB /Z 41290-2022 Information security techniques - Guidelines for mobile internet security audit ICS 35.030 CCSL80 National Standardization Guiding Technical Document of the People's Republic of China Information Security Technology Mobile Internet Security Audit Guidelines Published on 2022-03-09 2022-10-01 Implementation State Administration for Market Regulation Released by the National Standardization Administration directory Preface III 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Abbreviations 2 5 Audit activity 2 5.1 Overview 2 5.2 Security Audit Domain 2 5.3 Role Responsibilities 3 5.4 Audit Scope 4 5.5 Audit content 4 5.6 Active Framework 4 6 Activity function 4 6.1 Safety Guidelines4 6.2 Security Audit Policy Customization 5 6.3 Security Audit Trail 5 6.4 Security Audit Records 6 6.5 Secure Audit Storage 7 6.6 Security Audit Analysis 7 6.7 Security Audit Agent 8 6.8 Security Audit Response 8 6.9 Filing of Security Audit Records 8 6.10 Audit report generation 9 6.11 Security Audit Review 9 Appendix A (Informative) Mobile Internet Security Audit Process 10 Reference 13

foreword

This document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for Standardization Work Part 1.Structure and Drafting Rules of Standardization Documents" drafted. Please note that some content of this document may be patented. The issuing agency of this document assumes no responsibility for identifying patents. This document is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260). This document was drafted by. Beijing Jiaotong University, Beijing Sifudi Information Technology Co., Ltd., Beijing Information Technology University, China Information Communication Technology Group Co., Ltd., Inspur Software Technology Co., Ltd., China Network Security Review Technology and Certification Center, ZTE Corporation Company, Lenovo (Beijing) Co., Ltd. The main drafters of this document. Liu Yun, Zhang Zhenjiang, Si Xiameng, Zeng Jianjun, Han Xiaolu, Zhang Yaochen, Wu Di, Shen Bo, Zhao Yingsi, Xiong Fei, Wang Jianwei, Zhong Hong, Li Ruxin. Information Security Technology Mobile Internet Security Audit Guidelines

1 Scope

This document provides guidance and suggestions on the roles and responsibilities, audit scope, and audit content of mobile Internet security audit activities. The framework, functional tasks and specific content of security audit activities are presented. This document applies to activities related to mobile Internet security audits.

2 Normative references

The contents of the following documents constitute essential provisions of this document through normative references in the text. Among them, dated citations documents, only the version corresponding to that date applies to this document; for undated references, the latest edition (including all amendments) applies to this document. GB/T 17143.6-1997 Information Technology Open System Interconnection System Management Part 6.Log Control Function GB 17859-1999 Criteria for classification of security protection levels of computer information systems GB/T 18336.2-2015 Information Technology Security Technology Information Technology Security Assessment Criteria Part 2.Security Functional Components GB/T 25069 Information Security Technical Terminology GB/T 35281-2017 Information Security Technology Mobile Internet Application Server Security Technical Requirements

3 Terms and Definitions

GB/T 17143.6-1997, GB 17859-1999, GB/T 18336.2-2015, GB/T 25069 and GB/T 35281- 2017 and the following terms and definitions apply to this document. 3.1 mobile internet mobile internet Users use mobile terminals (including mobile phones, network cards, tablet computers, smart books, etc.) to obtain mobile communication network services through mobile networks An open infrastructure telecommunications network for and Internet services. [Source. GB/T 35281-2017, 3.1.1] 3.2 Events are recorded and analyzed, and comparative actions are taken for specific events. [Source. GB/T 20945-2013, 3.2] 3.3 securityauditdomain In information systems and networks, under a single security audit policy, the security audit subject is responsible for the collection of audit entities. 3.4 privatedata The data that the security audit subject privately owns and needs to protect.
......
Image     

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GBZ41290-2022_English be delivered?

Answer: Upon your order, we will start to translate GBZ41290-2022_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GBZ41290-2022_English with my colleagues?

Answer: Yes. The purchased PDF of GBZ41290-2022_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.