GB/T 26333-2010 English PDFUS$509.00 · In stock
Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 26333-2010: Evaluation specification for security in industrial control network Status: Valid
Basic dataStandard ID: GB/T 26333-2010 (GB/T26333-2010)Description (Translated English): Evaluation specification for security in industrial control network Sector / Industry: National Standard (Recommended) Classification of Chinese Standard: N10 Classification of International Standard: 25.040 Word Count Estimation: 22,215 Date of Issue: 2011-01-14 Date of Implementation: 2011-06-01 Quoted Standard: GB/T 9361-1988; GB/T 9387.2-1995; GB 17859-1999; GB/T 17903.1-2008; GB/T 17965-2000; GB/T 18272.1-2000; GB/T 18272.2-2000; GB/T 18272.3-2000; GB/T 18272.7-2006; GB/T 18336.1-2008; GB/T 18336.2-2008; GB/T 18336.3-2008; GB/T 19715.1-2005; GB/T 20000.4-2003; GB/T 20269-2006; GB/T 20270-2006; GB/T 20271-2006; GB/T 20275-2006; GB/T 20278-2006; GB/T 20281-2006; GB/T 20945-2007; GB/T 21052-2007; GB/T 22081-2008; GB/T 22239-2008; ISO/IEC TR 13335; ISO/IEC TR 13335.1; ISO/IEC 15408; ISO/IEC 17799-2000; ISO/IEC 17799-2005 Regulation (derived from): National Standard Approval Announcement 2011 No.111 Issuing agency(ies): General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China Summary: This standard specifies the steps of assessment. Gives recommendations on assessment methods. This standard applies to security risk assessment Kontron industrial networks, the definition of the main points of the assessment. This standard is discussed in industrial control communications security network, which mainly depends on the protective measures adopted by the system. GB/T 26333-2010: Evaluation specification for security in industrial control network---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.Evaluation specification for security in industrial control network ICS 25.040 N10 National Standards of People's Republic of China Industrial control network security risk assessment specification Issued on. 2011-01-14 2011-06-01 implementation Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China Standardization Administration of China released Table of ContentsIntroduction Ⅲ Introduction Ⅳ 1 Scope 1 2 Normative references 1 3 Terms and definitions 2 4 Symbols and abbreviations 3 Point 3 5 Risk Assessment 6 Characteristics 6 7 to determine the purpose of the assessment 8 8 8 assessment design and planning 11 9 develop an assessment plan 10 11 Technology Assessment Assessment of the implementation of 1211 12 prepare an assessment report 12 Security Risk Assessment Appendix A (normative) industrial control network security gateway 13 Appendix B (normative) Field equipment industrial control network security risk assessment 15ForewordThis standard was drafted in accordance with GB/T 1.1-2009 given rules. Some contents of this standard may involve certain patents, the present standard of any such patent shall not bear responsibility for identification. The standard proposed by China Machinery Industry Federation. The standard measurement and control by the National Standardization Technical Committee of industrial processes. This standard was drafted. Chongqing University of Posts and Telecommunications, Zhejiang University, Zhejiang Control Technology Co., Ltd., Mechanical Instrumentation Technology Surgery Economic Research Institute, Shenyang Institute of Automation, Chinese Academy of Sciences, Dalian University of Technology, Shanghai Industrial Automation Instrument Research Institute, Shanghai Automation Instrumentation Co., Ltd., China Silian Instrument Group Co., Ltd., Southwest University, Tianjin Instrument Group Instrument Co., Ltd., Beijing-controlled Technology Co., Ltd. Drafters of this standard. Wang Hao, Wang Ping, Jin Jianxiang, FENG Dong-qin, Ouyang Jinsong, Mei Ke, XU Ai-dong, Zhongchong right, Miao Xueqin, including Wei-hua, Liu Jin, Zhang Qingjun, secretary Ming Rui, Liu Jie, Liu Feng, Yang Bin, Zhou Yong.IntroductionWith the various communication technologies are widely used in industrial control networks, in more functionality while industrial control network security asked Problem has become increasingly prominent. This assessment is a standard for industrial control network security risk assessment methodology. Through the industrial control network security risk assessment You can find the network security risks by adopting appropriate security measures to make security vulnerabilities, thereby enhancing the industrial control network security. This standard specifies the industrial control network security risk assessment methodology and general guidelines, describes industrial control network security risk assessment The general procedure design focuses on the assessment and evaluation of the analytical program. Industrial control network security risk assessment specification1 ScopeThis standard specifies the procedure for evaluating and gives recommendations on evaluation methods. This standard applies to industrial control network security risk assessment, the definition of the main points of the assessment. This standard is discussed in industrial control network communications security, which depends primarily on protective measures system used.2 Normative referencesThe following documents for the application of this document is essential. For dated references, only the dated version suitable for use herein Member. For undated references, the latest edition (including any amendments) applies to this document. GB/T 9361-1988 computer site security requirements GB/T 9387.2-1995 Information processing systems - Open Systems Interconnection - Basic Reference Model - Part 2. Security Architecture GB 17859-1999 computer information system security protection classification criterion GB/T 17903.1-2008 Information technology - Security techniques - Non - repudiation - Part 1. Overview GB/T 17965-2000 Information technology - Open Systems Interconnection - Upper layers security model (idt ISO /IEC 10745.1995) GB /assessment - Part 1 T 18272.1-2000 industrial process measurement and control system evaluation of system properties. General and square Law Assessment - Part 2 GB/T 18272.2-2000 industrial process measurement and control system evaluation of system properties. Assessor Law Evaluation of GB/T 18272.3-2000 industrial process measurement and control system evaluation of system properties - Part 3. System Function Evaluation GB/T 18272.7-2006 industrial process measurement and control system evaluation assessment - Part 7 System features. System Security Evaluation GB/T 18336.1-2008 Information technology - Security techniques - Evaluation criteria for IT security - Part 1. Introduction and general Model (ISO /IEC 15408-1.2005, IDT) GB/T 18336.2-2008 Information technology - Security techniques - Evaluation criteria for IT security - Part 2. Security functional to Demand (ISO /IEC 15408-2.2005, IDT) GB/T 18336.3-2008 Information technology - Security techniques - Evaluation criteria for IT security - Part 3. Security assurance to Demand (ISO /IEC 15408-3.2005, IDT) GB/T 19715.1-2005 Information technology IT Security Management Guide - Part 1. Concepts and models for IT Security GB/T 20000.4-2003 Guide for standardization - Part 4. Safety aspects Standard GB/T 20269-2006 Information Security techniques - Information security management systems requirements GB/T 20270-2006 Information security technology security technology network infrastructure requirements GB/T 20271-2006 Information security technology - Common security techniques requirement information system GB/T 20275-2006 Information technology security intrusion detection system technical requirements and test evaluation methods GB/T 20278-2006 Information security technology for network vulnerability scanning product technical requirements GB/T 20281-2006 Information security technology firewall technology requirements and testing and evaluation approaches GB/T 20945-2007 Information security technology information system security audit requirements and product testing and evaluation methods ......Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 26333-2010_English be delivered?Answer: Upon your order, we will start to translate GB/T 26333-2010_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time.Question 2: Can I share the purchased PDF of GB/T 26333-2010_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 26333-2010_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay. |