GB/T 19715.2-2005 English PDFUS$719.00 ยท In stock
Delivery: <= 3 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 19715.2-2005: Information technology -- Guidelines for the management of IT security -- Part 2: Managing and planning IT security Status: Obsolete
Basic dataStandard ID: GB/T 19715.2-2005 (GB/T19715.2-2005)Description (Translated English): Information technology. Guidelines for the management of IT security. Part 2: Managing and planning IT security Sector / Industry: National Standard (Recommended) Classification of Chinese Standard: L80 Classification of International Standard: 35.040 Word Count Estimation: 18,148 Date of Issue: 2005-04-19 Date of Implementation: 2005-10-01 Adopted Standard: ISO/IEC TR 13335-2-1997, IDT Regulation (derived from): Announcement of Newly Approved National Standards No. 6 of 2005 (No. 80 overall) Issuing agency(ies): General Administration of Quality Supervision, Inspection and Quarantine of the People Republic of China, China National Standardization Administration Committee Summary: This standard specifies the management of IT security topics as well as some basic relationships between these topics. These sections on the identification and management of all aspects of IT security is useful. Part 1 describes familiar with the concepts and models for a comprehensive understanding of the standards is important. GB/T 19715.2-2005: Information technology -- Guidelines for the management of IT security -- Part 2: Managing and planning IT security---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order. Information technology.Guidelines for the management of IT security.Part 2. Managing and planning IT security ICS 35.040 L80 National Standards of People's Republic of China GB/T 19715.2-2005/ISO /IEC TR13335-2.1997 Information Technology Information Technology Security Management Guide Part 2. Managing and planning information technology security (ISO /IEC TR13335-2..1997, IDT) Released on.2005-04-19 Implemented.2005-10-01 General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China China National Standardization Administration issued ContentForeword III Introduction IV 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 structure 1 5 Purpose 1 6 background 1 7 IT Security Management 2 8 Overall IT Security Strategy 3 9 Organizational aspects of IT security 5 10 Overall Risk Analysis Strategy Option 7 11 IT Security Advice 8 12 IT System Security Policy 9 13 IT Security Plan 10 14 Implementing protective measures 10 15 Security awareness 11 16 Follow-up activities 11 17 Summary 13 GB/T 19715.2-2005/ISO /IEC TR13335-2.1997ForewordGB/T 19715 "Information Technology Information Technology Security Management Guide" is divided into five parts. --- Part 1. Information technology security concepts and models; --- Part 2. Management and planning of information technology security; --- Part 3. Information Technology Security Management Technology; --- Part 4. Selection of protective measures; --- Part 5. Protective measures for external connections. This part is equivalent to the international standard ISO /IEC TR13335-2..1997 "Information Technology Information Technology Security Management Guide No. 2 Part. Managing and Planning Information Technology Security. The guides in this section present some of the basic topics of IT security management and the relationships between these topics. These guidelines are for logos and It is useful to manage all aspects of IT security. This part is proposed by the Ministry of Information Industry of the People's Republic of China This part is under the jurisdiction of the National Information Security Standardization Technical Committee. This part is composed of China Electronics Technology Standardization Institute (CESI), the 15th Research Institute of China Electronics Technology Group, and China Electronics Technology The 30th Research Institute of the Group and Shanghai Sanshi Guardian Information Security Co., Ltd. were drafted. The main drafters of this section. An Jinhai, Lin Zhong, Lin Wangzhong, Wei Zhong, Luo Fengying, Chen Xing. GB/T 19715.2-2005/ISO /IEC TR13335-2.1997IntroductionThe purpose of GB/T 19715 is to provide guidance on IT security management, not a solution. Those responsible for IT in the organization Safe individuals should be able to use the information in this standard to meet their specific needs. The main objectives of this standard are. a) define and describe concepts related to IT security management; b) identify the relationship between IT security management and general IT management; c) presented several models that can be used to explain IT security; d) Provides general guidance on IT security management. This standard consists of several parts. Part 1 provides an overview of the basic concepts and models used to describe IT security management. This section Applicable to managers responsible for IT security and managers responsible for the overall security program of the organization. This section describes management and planning aspects. It is related to the manager of the IT system responsible for the organization. They can be. a) IT managers responsible for overseeing the design, implementation, testing, procurement or operation of IT systems; b) the manager responsible for the actual use of the IT system; c) Of course there are managers responsible for IT security. Part 3 describes the management activities involved in the life cycle of a project (such as planning, design, implementation, testing, acquisition, or operation). Safety technology suitable for use. Part 4 provides guidance on choosing protective measures and how they are supported through the use of baseline models and controls. It also describes How it complements the security techniques described in Part 3 and how to use additional evaluation methods to select protection measures. Part 5 provides the organization with a guide to connecting its IT system to an external network. This guide contains anti-connection security The choice and use of protective measures, the services supported by those connections, and the additional safeguards for the connected IT systems. GB/T 19715.2-2005/ISO /IEC TR13335-2.1997 Information Technology Information Technology Security Management Guide Part 2. Managing and planning information technology security1 ScopeThis section of GB/T 19715 addresses some of the basic topics of IT security management and the relationship between these topics. These partial pairs It is useful to identify and manage all aspects of IT security. It is important to be familiar with the concepts and models presented in Part 1 for a comprehensive understanding of this section.2 Normative referencesThe terms of the following documents become the provisions of this part by reference in this part of GB/T 19715. Quotations with dated , all subsequent amendments (not including errata content) or revisions do not apply to this section, however, encouragement is achieved under this section The parties to the agreement study whether the latest versions of these documents can be used. For undated references, the latest edition applies to this section. GB/T 19715.1-2005 Information technology - Information technology - Safety management guide - Part 1. Information technology security concepts and models (ISO /IEC TR13335-1..1996, IDT)3 Terms and definitionsThe terms and definitions established in GB/T 19715.1-2005 apply to this section, using the following terms. verifiability, assets, real Sex, availability, baseline control, confidentiality, data integrity, impact, integrity, IT security, IT security strategy, reliability, residual risk, wind Risk, risk analysis, risk management, protective measures, system integrity, threats, vulnerability.4 structureThis section has 17 chapters. Chapters 5 and 6 provide information on the purpose and background of this document. Chapter 7 provides successful IT An overview of the various activities involved in security management. Chapters 8 through 16 detail these activities. Chapter 17 provides a summary.5 PurposeThe purpose of this section is to present various activities related to IT security management and planning, as well as related roles and responsibilities in the organization. This is generally related to the IT manager responsible for the procurement, design, implementation, or operation of the IT system. In addition to IT security managers, but also negative Responsible for the IT system to specifically use the activities of the managers concerned. In summary, this section is responsible for any negative management responsibilities related to the organization of IT systems. People are useful.6 backgroundGovernment and commercial organizations rely heavily on the use of information for business activities. Confidentiality, integrity, availability, availability of information and services Loss of verification, authenticity and reliability can have a negative impact on the organization. Therefore, in the organization of protection information and management information technology (IT) security has important needs. In today's environment, this requirement to protect information is particularly important because many organizations pass the IT department. The network is connected internally and externally. IT security management is the process of achieving and maintaining confidentiality, integrity, availability, verifiability, authenticity and reliability. of. IT security management features include. a) Identify organizational IT security goals, strategies and strategies; GB/T 19715.2-2005/ISO /IEC TR13335-2.1997 ......Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 19715.2-2005_English be delivered?Answer: Upon your order, we will start to translate GB/T 19715.2-2005_English as soon as possible, and keep you informed of the progress. The lead time is typically 1 ~ 3 working days. The lengthier the document the longer the lead time.Question 2: Can I share the purchased PDF of GB/T 19715.2-2005_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 19715.2-2005_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay. |