Home Cart Quotation About-Us
www.ChineseStandard.net
SEARCH

GA/T 1143-2014 English PDF

US$599.00 · In stock
Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email.
GA/T 1143-2014: Information security technology. Security technical requirements for data destruction software products
Standard IDUSDBUY PDFLead-DaysStandard Title (Description)Status
GA/T 1143-2014599 Add to Cart 4 days Information security technology. Security technical requirements for data destruction software products

Similar standards

GB/T 37230   GA/T 1059   GB 13954   GA/T 1136   GA/T 1137   GA 1153   

Basic data

Standard ID: GA/T 1143-2014 (GA/T1143-2014)
Description (Translated English): Information security technology. Security technical requirements for data destruction software products
Sector / Industry: Public Security (Police) Industry Standard (Recommended)
Classification of Chinese Standard: A90
Classification of International Standard: 35.240
Word Count Estimation: 17,178
Quoted Standard: GB 17859-1999; GB/T 18336.1-2008; GB/T 18336.2-2008; GB/T 18336.3-2008; GB/T 25069-2010
Regulation (derived from): Notice on Publication of Public Safety Industry Standard (Year of 2014); Industry Standard Record Announcement No. 4 of 2015 (No. 184)
Issuing agency(ies): Ministry of Public Security
Summary: This standard specifies the functional requirements, safety assurance requirements and classification requirements for data destruction software products. This standard is applicable to the design, development and testing of data destruction software prod

GA/T 1143-2014: Information security technology. Security technical requirements for data destruction software products


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology.Security technical requirements for data destruction software products ICS 35.240 A90 People's Republic of China Public Security Industry Standards Information Security Technology Data destruction software product safety technical requirements Issued on. 2014-03-14 2014-03-14 implementation People's Republic of China Ministry of Public Security

Table of Contents

Introduction Ⅲ Introduction Ⅳ 1 Scope 1 2 Normative references 1 3 Terms and definitions 4 Data Destruction Software Product Description 1 5 2 Security Environment 5.1 Hypothesis 2 5.2 Threat 2 5.3 2 Organization for Security Policy 2 6 security purposes 6.1 Product Safety Objective 2 6.2 Environmental security objectives 3 7 Security functional requirements 3 7.1 Erase function 3 7.2 Audit Function 5 7.3 security management functions 5 7.4 Stability and fault tolerance of 5 8 6 Security assurance requirements 8.1 Configuration Management 6 8.2 Delivery and Operation 6 8.3 Development 7 8.4 Guidance Document 8 9 8.5 Life Cycle Support 8.6 Test 9 8.7 Vulnerability assessment 10 9 basic principles of technical requirements 11 9.1 Security functional requirements Fundamentals 11 9.2 Security assurance requirements 11 Fundamentals 10 11 classification 10.1 Overview 11 10.2 Classification of security functional requirements 11 10.3 Classification of security assurance requirements 12

Foreword

This standard was drafted in accordance with GB/T 1.1-2009 given rules. This standard was proposed by the Ministry of Public Security Network Security Protection Agency. This standard is under the jurisdiction of the Ministry of Public Security Information System Standardization Technical Committee. This standard was drafted. Ministry of Public Security of Computer Information System Security Product Quality Supervision and Inspection Center, Institute of High Energy Physics Network Security Laboratory, Beijing Jinyuan Long Pulse Information Technology Co., Ltd. Xiamen City Meiah Pico Information, Ministry of Public Security the third RESEARCH The study. The main drafters of this standard. Lu Zhen, Zhao Ting, Gu Jian, Gu Wei, Qiu Zi Hua, Liang Wei, Lin Fan, Huang Wei, Wu glow.

Introduction

This standard is described in detail and data destruction software product safety environment-related assumptions, threats and organizational security policies, defines the data pin Ruined safety purpose software products and supporting environment, demonstrated safety and functional requirements can be traced back cover product safety purposes, safety purposes can Retroactive and cover enough security environment related assumptions, threats and organizational security policies. The standard base-level reference to GB/T 18336.3-2008 prescribed level EAL2 security assurance requirements, and enhance the level at EAL4 level Security assurance requirements based on the vulnerability analysis requires upgrade to an attacker can withstand moderate attack potential attack. This standard only shows the data destruction software products should meet the technical requirements of safety, but for data destruction software product specific technical implementation Now way, way, etc. is not required. Information Security Technology Data destruction software product safety technical requirements

1 Scope

This standard specifies the security features of software products for data destruction requirements, security assurance requirements and grading requirements. This standard applies to the use of computer information systems, magnetic storage media data destruction software for product design, development and Testing.

2 Normative references

The following documents for the application of this document is essential. For dated references, only the dated version suitable for use herein Member. For undated references, the latest edition (including any amendments) applies to this document. GB 17859-1999 computer information system security protection classification criterion GB/T 18336-2008 (all parts), Information technology - Security techniques - Information Technology Security Evaluation Guidelines GB/T 25069-2010 Information security technology terms

3 Terms and Definitions

GB 17859-1999, GB/T 18336-2008 (all parts) and GB/T 25069-2010 defined and the following terms and definitions Meaning applicable to this document. 3.1 Data overwrite dataoverwriting The non-sensitive data before writing the data stored there sensitive position, to clear the data object. 3.2 3 data destruction method 3timesdatadestructionmethod Targeting data on the disk to overwrite rewritable manner, after each section head overwritten three times, the first time through a fixed character, the first 2nd fixed characters complement 3rd be overwritten by random characters. 3.3 7 data destruction method 7timesdatadestructionmethod Targeting data on the disk to overwrite rewritable manner, after each section head overwritten seven times, 1st and 2nd fixed Override character and its complement, respectively, followed by a single character, random characters, and then were fixed character and its complement overwritten with the last used Machine characters overwritten.

4 Data Destruction Software Product Description

Data destruction software products in the form of software installed on the host to destroy data will cover non-sensitive data is written before there Min A sense of where data is stored, the purpose of clearing data. Data destruction software products to protect assets, but is still sensitive information users no longer need this information for the user, although no longer
......
Image     

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GA/T 1143-2014_English be delivered?

Answer: Upon your order, we will start to translate GA/T 1143-2014_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GA/T 1143-2014_English with my colleagues?

Answer: Yes. The purchased PDF of GA/T 1143-2014_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.