|
US$599.00 · In stock Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email. GA/T 1143-2014: Information security technology. Security technical requirements for data destruction software products
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GA/T 1143-2014 | English | 599 |
Add to Cart
|
4 days [Need to translate]
|
Information security technology. Security technical requirements for data destruction software products
| |
GA/T 1143-2014
|
PDF similar to GA/T 1143-2014
Basic data | Standard ID | GA/T 1143-2014 (GA/T1143-2014) | | Description (Translated English) | Information security technology. Security technical requirements for data destruction software products | | Sector / Industry | Public Security (Police) Industry Standard (Recommended) | | Classification of Chinese Standard | A90 | | Classification of International Standard | 35.240 | | Word Count Estimation | 17,178 | | Quoted Standard | GB 17859-1999; GB/T 18336.1-2008; GB/T 18336.2-2008; GB/T 18336.3-2008; GB/T 25069-2010 | | Regulation (derived from) | Notice on Publication of Public Safety Industry Standard (Year of 2014); Industry Standard Record Announcement No. 4 of 2015 (No. 184) | | Issuing agency(ies) | Ministry of Public Security | | Summary | This standard specifies the functional requirements, safety assurance requirements and classification requirements for data destruction software products. This standard is applicable to the design, development and testing of data destruction software prod |
GA/T 1143-2014: Information security technology. Security technical requirements for data destruction software products ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology.Security technical requirements for data destruction software products
ICS 35.240
A90
People's Republic of China Public Security Industry Standards
Information Security Technology
Data destruction software product safety technical requirements
Issued on. 2014-03-14
2014-03-14 implementation
People's Republic of China Ministry of Public Security
Table of Contents
Introduction Ⅲ
Introduction Ⅳ
1 Scope 1
2 Normative references 1
3 Terms and definitions
4 Data Destruction Software Product Description 1
5 2 Security Environment
5.1 Hypothesis 2
5.2 Threat 2
5.3 2 Organization for Security Policy
2 6 security purposes
6.1 Product Safety Objective 2
6.2 Environmental security objectives 3
7 Security functional requirements 3
7.1 Erase function 3
7.2 Audit Function 5
7.3 security management functions 5
7.4 Stability and fault tolerance of 5
8 6 Security assurance requirements
8.1 Configuration Management 6
8.2 Delivery and Operation 6
8.3 Development 7
8.4 Guidance Document 8
9 8.5 Life Cycle Support
8.6 Test 9
8.7 Vulnerability assessment 10
9 basic principles of technical requirements 11
9.1 Security functional requirements Fundamentals 11
9.2 Security assurance requirements 11 Fundamentals
10 11 classification
10.1 Overview 11
10.2 Classification of security functional requirements 11
10.3 Classification of security assurance requirements 12
Foreword
This standard was drafted in accordance with GB/T 1.1-2009 given rules.
This standard was proposed by the Ministry of Public Security Network Security Protection Agency.
This standard is under the jurisdiction of the Ministry of Public Security Information System Standardization Technical Committee.
This standard was drafted. Ministry of Public Security of Computer Information System Security Product Quality Supervision and Inspection Center, Institute of High Energy Physics
Network Security Laboratory, Beijing Jinyuan Long Pulse Information Technology Co., Ltd. Xiamen City Meiah Pico Information, Ministry of Public Security the third RESEARCH
The study.
The main drafters of this standard. Lu Zhen, Zhao Ting, Gu Jian, Gu Wei, Qiu Zi Hua, Liang Wei, Lin Fan, Huang Wei, Wu glow.
Introduction
This standard is described in detail and data destruction software product safety environment-related assumptions, threats and organizational security policies, defines the data pin
Ruined safety purpose software products and supporting environment, demonstrated safety and functional requirements can be traced back cover product safety purposes, safety purposes can
Retroactive and cover enough security environment related assumptions, threats and organizational security policies.
The standard base-level reference to GB/T 18336.3-2008 prescribed level EAL2 security assurance requirements, and enhance the level at EAL4 level
Security assurance requirements based on the vulnerability analysis requires upgrade to an attacker can withstand moderate attack potential attack.
This standard only shows the data destruction software products should meet the technical requirements of safety, but for data destruction software product specific technical implementation
Now way, way, etc. is not required.
Information Security Technology
Data destruction software product safety technical requirements
1 Scope
This standard specifies the security features of software products for data destruction requirements, security assurance requirements and grading requirements.
This standard applies to the use of computer information systems, magnetic storage media data destruction software for product design, development and
Testing.
2 Normative references
The following documents for the application of this document is essential. For dated references, only the dated version suitable for use herein
Member. For undated references, the latest edition (including any amendments) applies to this document.
GB 17859-1999 computer information system security protection classification criterion
GB/T 18336-2008 (all parts), Information technology - Security techniques - Information Technology Security Evaluation Guidelines
GB/T 25069-2010 Information security technology terms
3 Terms and Definitions
GB 17859-1999, GB/T 18336-2008 (all parts) and GB/T 25069-2010 defined and the following terms and definitions
Meaning applicable to this document.
3.1
Data overwrite dataoverwriting
The non-sensitive data before writing the data stored there sensitive position, to clear the data object.
3.2
3 data destruction method 3timesdatadestructionmethod
Targeting data on the disk to overwrite rewritable manner, after each section head overwritten three times, the first time through a fixed character, the first
2nd fixed characters complement 3rd be overwritten by random characters.
3.3
7 data destruction method 7timesdatadestructionmethod
Targeting data on the disk to overwrite rewritable manner, after each section head overwritten seven times, 1st and 2nd fixed
Override character and its complement, respectively, followed by a single character, random characters, and then were fixed character and its complement overwritten with the last used
Machine characters overwritten.
4 Data Destruction Software Product Description
Data destruction software products in the form of software installed on the host to destroy data will cover non-sensitive data is written before there Min
A sense of where data is stored, the purpose of clearing data.
Data destruction software products to protect assets, but is still sensitive information users no longer need this information for the user, although no longer
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GA/T 1143-2014_English be delivered?Answer: Upon your order, we will start to translate GA/T 1143-2014_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GA/T 1143-2014_English with my colleagues?Answer: Yes. The purchased PDF of GA/T 1143-2014_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
|