Home Cart Quotation About-Us
www.ChineseStandard.net
SEARCH

GA/T 1144-2014 English PDF

US$699.00 ยท In stock
Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email.
GA/T 1144-2014: Information security technology. Security technical requirements for unauthorized external connection monitoring products
Standard IDUSDBUY PDFLead-DaysStandard Title (Description)Status
GA/T 1144-2014699 Add to Cart 4 days Information security technology. Security technical requirements for unauthorized external connection monitoring products

Similar standards

GB/T 37230   GA/T 1059   GB 13954   GA 1154.1   GA 1154.2   GA 1153   

Basic data

Standard ID: GA/T 1144-2014 (GA/T1144-2014)
Description (Translated English): Information security technology. Security technical requirements for unauthorized external connection monitoring products
Sector / Industry: Public Security (Police) Industry Standard (Recommended)
Classification of Chinese Standard: A90
Classification of International Standard: 35.240
Word Count Estimation: 20,221
Quoted Standard: GB/T 25069-2010; GB 17859-1999; GB/T 18336.1-2008; GB/T 18336.2-2008; GB/T 18336.3-2008
Regulation (derived from): Notice on Publication of Public Safety Industry Standard (Year of 2014); Industry Standard Record Announcement No. 4 of 2015 (No. 184)
Issuing agency(ies): Ministry of Public Security
Summary: This standard specifies the safety functional requirements, safety assurance requirements and classification requirements for non-authorized outreach monitoring products. This standard applies to the design, development and testing of non-authorized outre

GA/T 1144-2014: Information security technology. Security technical requirements for unauthorized external connection monitoring products


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology.Security technical requirements for unauthorized external connection monitoring products ICS 35.240 A90 People 's Republic of China Public Security Industry Standard Information Security Technology Technical requirements for non - authorized outreach monitoring product safety Released.2014-03-14 2014-03-14 Implementation Issued by the Ministry of Public Security of the People 's Republic of China Directory Preface III Introduction IV 1 Scope 1 2 normative reference document 1 3 Terms and definitions 1 4 Unauthorized Outside Monitoring Product Description 1 5 security environment 2 5.1 hypothesis 2 5.2 Threats 3 5.3 Organizational Security Strategy 3 6 safe purpose 4 6.1 Product safety objectives 4 6.2 Environmental safety objectives 4 7 safety function requirements 5 7.1 controlled host management 5 7.2 Unauthorized outreach monitoring 5 7.3 Response processing 5 7.4 Component Security 6 7.5 Safety Management 6 7.6 Audit function 7 8 security requirements 8 8.1 Configuration Management 8 8.2 Delivery and Operation 9 8.3 Development 9 8.4 Guidance Document 10 8.5 life cycle support 11 8.6 Test 11 8.7 Assessment of vulnerability 12 Basic Requirements for Technical Requirements 9.1 Safety Functional Requirements Fundamentals 13 9.2 Essentials of Safety Assurance 14 Classification requirements 10.1 Overview 14 10.2 Classification of safety function requirements 10.3 Safety Assurance Requirements Level 15

Foreword

This standard is drafted in accordance with the rules given in GB/T 1.1-2009. This standard is proposed by the Ministry of Public Security Network Security Bureau. This standard by the Ministry of Public Security Information System Security Standardization Technical Committee. The drafting of this standard. the Ministry of Public Security Computer Information System Security Product Quality Supervision and Inspection Center, the Ministry of Public Security Network Security Bureau, Xiamen City, the United States and Asia Park Branch Information Co., Ltd., the Ministry of Public Security Third Institute. The main drafters of this standard. Zou Chunming, Yu You, Lu Lei, Wu Qicong, Lu Zhen, Gu Jian, Chen Fen, Zhang Yongguang

Introduction

This standard describes in detail the assumptions, threats, and organizational security policies associated with non-authorized outreach monitoring of the product's security environment, The purpose of the outreach monitoring product and its supporting environment is to demonstrate that the safety function requirements can be traced back and covered with product safety objectives, safety objectives The ability to trace and cover security-related assumptions, threats, and organizational security policies. The basic level of this standard refers to the GB/T 18336.3-2008 in the provisions of the EAL2 level security requirements, enhanced level in the EAL4 level Security assurance requirements, based on the vulnerability analysis requirements can be raised to attack the potential of attack attack attack. This standard only gives the technical requirements for non-authorized outreach monitoring products to be met, but the specific technical aspects of non-authorized outreach monitoring products Technology to achieve the way, methods do not do the request. Information Security Technology Technical requirements for non - authorized outreach monitoring product safety

1 Scope

This standard specifies the safety functional requirements, safety assurance requirements, and grading requirements for non-authorized outreach products. This standard applies to the design, development and testing of unauthorized outreach monitoring products.

2 normative reference documents

The following documents are indispensable for the application of this document. For dated references, only the dated edition applies to this article Pieces. For undated references, the latest edition (including all modifications) applies to this document. Classification rules for the classification of security levels for computer information systems GB 17859-1999 GB/T 18336-2008 (all parts) Information technology Security technology Information technology security assessment criteria Information security technical terminology GB/T 25069-2010

3 terms and definitions

GB 17859-1999, GB/T 18336-2008 (all parts) and GB/T 25069-2010 and the following terms and definitions Applies to this document. 3.1 Unauthorized outexientconnection The interconnection behavior of the protected network internal hosts in connection with unauthorized networks outside the security policy, including but not limited to dual Network card, modem, ADSL, wireless card and so on. 3.2 Proxy agent Software program, can accept the server control, to achieve the host of non-authorized outreach behavior monitoring. 3.3 Controlled host controledhost Installed the agent, able to accept the server control of the host.

4 Unauthorized Outside Monitoring Product Description

Unlicensed outbound monitoring products are usually deployed in C/S mode, including servers and agents. Can be controlled by the server on the host Issued a policy to monitor or block the host host in the security policy to allow the connection outside the non-authorized network behavior, and its timely positioning, The agent can send the monitoring results and alarm information to the server. There are two main types of network environments for non-authorized outreach monitoring products. one is an isolated network, which is physically isolated from other networks, Usually that the network within the network through a certain way to connect to other networks that is non-authorized outreach; the second category for the controlled network, the network And other networks are logically accessible, but access to other networks is controlled and/or auditable if the hosts within the network pass
......
Image     

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GA/T 1144-2014_English be delivered?

Answer: Upon your order, we will start to translate GA/T 1144-2014_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GA/T 1144-2014_English with my colleagues?

Answer: Yes. The purchased PDF of GA/T 1144-2014_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.