GB/T 25069-2022 English PDFUS$3489.00 ยท In stock
Delivery: <= 16 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 25069-2022: Information security techniques - Terminology Status: Valid GB/T 25069: Historical versions
Basic dataStandard ID: GB/T 25069-2022 (GB/T25069-2022)Description (Translated English): Information security techniques - Terminology Sector / Industry: National Standard (Recommended) Classification of Chinese Standard: L80 Word Count Estimation: 174,121 Issuing agency(ies): State Administration for Market Regulation, China National Standardization Administration GB/T 25069-2022: Information security techniques - Terminology---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.Information security techniques -- Terminology ICS 35.030 CCSL80 National Standards of People's Republic of China Replacing GB/T 25069-2010 Information Security Technical Terminology Published on 2022-03-09 2022-10-01 Implementation State Administration for Market Regulation Released by the National Standardization Administration directory Preface III Introduction IV 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Terminology classification 92 Reference 117 Index 135 forewordThis document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for Standardization Work Part 1.Structure and Drafting Rules of Standardization Documents" drafted. This document replaces GB/T 25069-2010 "Information Security Technical Terminology". Compared with GB/T 25069-2010, except for structural adjustment In addition to editorial changes, the main technical changes are as follows. a) In "Terms and Definitions", new items were introduced, some items were updated, uncommon items were deleted, and the original classification was cancelled (see Chapter 3); b) Added "Term Classification", divided into "Cryptographic Mechanism", "Authentication and Authorization", "Computational Security", "Communication Security" and "Application Security" Class", "Data Security Class", "Security Service Class", "Security Evaluation Class" and "Security Management Class" (see Chapter 4). Please note that some content of this document may be patented. The issuing agency of this document assumes no responsibility for identifying patents. This document is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260). This document is drafted by. CLP Great Wall Internet System Application Co., Ltd., China Electronics Standardization Institute, Chinese Academy of Sciences Software Research Institute, Sichuan University, AsiaInfo Technology (Chengdu) Co., Ltd., National Security Technology Evaluation Center, Microsoft (China) Co., Ltd., CLP Data Service Co., Ltd., Huawei Technologies Co., Ltd., Beijing Tianrongxin Network Security Technology Co., Ltd., China Network Security Review Technology and Certification Center, State Information Center, Ant Technology Group Co., Ltd., Xi'an Xidian Jietong Wireless Network Communication Co., Ltd., Ministry of Public Security No. Third Research Institute, Shanghai Three Zero Guard Information Security Co., Ltd., China Software Evaluation Center, Shaanxi Network and Information Security Evaluation Center, National Computer Network Emergency Technology Handling Coordination Center, China Information Security Evaluation Center, Tsinghua University, Shandong University, State Cryptography Administration for commercial use Password Detection Center, Beijing Xin'an Century Technology Co., Ltd., Beijing Xiaolei Technology Co., Ltd., Chengdu Westone Information Industry Co., Ltd. Co., Ltd., Beijing Digital Certification Co., Ltd., Feitian Chengxin Technology Co., Ltd., Beijing Baidu Netcom Technology Co., Ltd., Beijing Qiqi Tiger Technology Co., Ltd., Xi'an Dingdu Network Technology Co., Ltd., Beijing Saixi Technology Development Co., Ltd., Beijing Zechuang Tiancheng Technology Development Co., Ltd. Exhibition Co., Ltd. The main drafters of this document. Min Jinghua, Wang Huili, Wang Jiao, Liu Xiangang, Shangguan Xiaoli, Zhang Liwu, Huang Luxi, Huang Cheng, Pang Yong, Yang Biyao, Liu Dongmei, Zhou Yachao, Fan Dongyang, Ge Xiaoyu, Pang Ting, An Gaofeng, Cheng Yuqi, You You, Cui Yuhua, Cheng Hao, Wang Xin, Du Zhiqiang, Chen Changsong, Ganlu, Guo Yongzhen, Li Yi, Shu Min, Shi Hongsong, Jia Keting, Kong Fanyu, Lv Chunmei, Wang Zongbin, Liu Zengshou, Zhang Liting, Xia Luning, Zhu Pengfei, Wang Haitang, Wu Yuesheng, Zhang Yi, Liu Bei, Fang Yong, Ma Zhuoyuan, Zhao Dekun, Huang Yin. The previous versions of this document and its superseded documents are as follows. ---First published in.2010 as GB/T 25069-2010; ---This is the first revision.IntroductionInformation security technical terminology is the basic language for technical communication in the field of information security. Unify normative terms and definitions to help standardize Accurately understand and express technical content to facilitate technical communication and research. To this end, this document is based on published national standards in the field of information security technology. Terms and definitions in standards and international standards, which standardize basic or common information security technical terms and definitions. The sources of terms and definitions in this document are mainly managed by the National Information Security Standardization Technical Committee (SAC/TC260) and formally Published national standards and ISO /IEC JTC1/SC27 are responsible for formulating and officially publishing international standards. Information Security Technical Terminology1 ScopeThis document defines the terms and definitions of basic or general concepts in the field of information security technology, and categorizes them. This document is applicable to the understanding of the concept of information security technology, the formulation of other information security technology standards, and the national standards for information security technology. Communication inside and outside.2 Normative referencesThere are no normative references in this document.3 Terms and Definitions3.1 security For a system, the properties of confidentiality, integrity, availability, verifiability, authenticity and reliability are obtained. [Source. ISO /IEC TR15443-1.2012, 3.21] 3.2 security parameters securityparameters Various variables that determine the security strength of a mechanism. [Source. ISO /IEC 18370-2.2016, 3.8] 3.3 security policy securitypolicy A system used to govern the management, protection and distribution of assets (including sensitive information) affecting security and related elements within an organization and its systems Group rules, guidelines and practices. 3.4 security outline securityprogramming < Industrial control> In the security construction of industrial control systems, a series of security controls are selected to meet the needs and objectives of organizational security. control measures. [Source. GB/T 32919-2016, 3.6, with modifications] 3.5 securemulti-tenancy A type of multi-tenancy that employs security controls to explicitly protect against data corruption and provides validation of those controls for proper governance. Note 1.Secure multi-tenancy occurs when the risk profile of an individual tenant does not exceed that of being in a dedicated single-tenant environment. Note 2.In a very secure environment, even tenant identities are kept secret. [Source. ISO /IEC 27040.2015, 3.39] 3.6 According to the importance of business information and system services and the impact of damage, determine the implementation of a certain level of protection. ......Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 25069-2022_English be delivered?Answer: Upon your order, we will start to translate GB/T 25069-2022_English as soon as possible, and keep you informed of the progress. The lead time is typically 11 ~ 16 working days. The lengthier the document the longer the lead time.Question 2: Can I share the purchased PDF of GB/T 25069-2022_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 25069-2022_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.Question 5: Should I purchase the latest version GB/T 25069-2022?Answer: Yes. Unless special scenarios such as technical constraints or academic study, you should always prioritize to purchase the latest version GB/T 25069-2022 even if the enforcement date is in future. Complying with the latest version means that, by default, it also complies with all the earlier versions, technically. |