|
US$229.00 ยท In stock Delivery: <= 3 days. True-PDF full-copy in English will be manually translated and delivered via email. GA/T 1536-2018: Information security technology - Testing and evaluation criteria for detection products of host computer security Status: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GA/T 1536-2018 | English | 229 |
Add to Cart
|
3 days [Need to translate]
|
Information security technology - Testing and evaluation criteria for detection products of host computer security
| Valid |
GA/T 1536-2018
|
PDF similar to GA/T 1536-2018
Basic data | Standard ID | GA/T 1536-2018 (GA/T1536-2018) | | Description (Translated English) | Information security technology - Testing and evaluation criteria for detection products of host computer security | | Sector / Industry | Public Security (Police) Industry Standard (Recommended) | | Classification of Chinese Standard | L80 | | Classification of International Standard | 35.040 | | Word Count Estimation | 10,187 | | Date of Issue | 2018-12-26 | | Date of Implementation | 2018-12-26 | | Issuing agency(ies) | Ministry of Public Security |
GA/T 1536-2018: Information security technology - Testing and evaluation criteria for detection products of host computer security ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology-Testing and evaluation criteria for detection products of host computer security
ICS 35.040
L80
People's Republic of China Public Safety Industry Standard
Information Security Technology
Computer host security testing product evaluation criteria
2018-12-26 release
2018-12-26 Implementation
Published by the Ministry of Public Security of the People's Republic of China
Contents
Foreword III
1 Scope 1
2 Normalized references 1
3 Terms and definitions 1
4 Inspection requirements 2
5 Test indicator requirements 2
6 Functional requirements 2
7 Test method 4
8 Report format 4
9 Rating Method 4
Foreword
This standard was drafted in accordance with the rules given in GB/T 1.1-2009.
This standard was proposed by the Cyber Security and Protection Bureau of the Ministry of Public Security.
This standard is under the jurisdiction of the Information System Security Standardization Technical Committee of the Ministry of Public Security.
This standard was drafted. National Computer Virus Emergency Response Center, Tianjin Public Security Bureau Cyber Security Defense Corps, Jiangsu Tongfu Dunxin
Information Security Technology Co., Ltd., Hengan Jiaxin (Beijing) Technology Co., Ltd., Beijing Qixingxing Information Security Technology Co., Ltd., Beijing Qihoo
Technology Co., Ltd., Beijing Tianrongxin Technology Co., Ltd., Nankai University, Beijing Antiy Network Security Technology Co., Ltd.
The main drafters of this standard. Chen Jianmin, Liu Yan, Du Zhenhua, Huang Yibin, Cao Peng, Yang Jian, Zhao Xiaoming, Zhang Yijing, Zhang Rui, Zhang Xin, Wang Wenyi,
Xiao Xinguang, Zhao Huanju, Zhang Zhenwei, Cui Tingting, Xu Yuqing, Wang Yan, Jia Chunfu, Shu Xin, Li Ju, Sun Bo, Li Dong.
Information Security Technology
Computer host security testing product evaluation criteria
1 Scope
This standard specifies the inspection requirements, test index requirements, functional requirements, test methods, and report formats of computer mainframe safety inspection products.
And rating methods.
This standard applies to the development and testing of computer host security testing products.
2 Normalized references
The following documents are essential for the application of this document. For dated references, only the dated version applies to this article
Pieces. For undated references, the latest version (including all amendments) applies to this document.
GB/T 18336.3-2015 Information Technology Security Technology Information Technology Security Evaluation Guidelines Part 3. Security Assurance Components
GA 243-2000 Computer Virus Control Product Rating Guidelines
GA/T 757-2008 Program Function Inspection Method
3 terms and definitions
GB/T 18336.3-2015, GA 243-2000, GA/T 757-2008 and the following terms and definitions apply to this
file.
3.1
Operating system security
Characterization of the confidentiality, integrity, and availability of information stored, transmitted, and processed by the operating system.
3.2
User identification
It is used to identify the identity of the user and ensure the uniqueness and legibility of the user in the system.Generally, the name and user identifier (UID)
Identify a user in the system.
3.3
Userauthentication
Confirm the authenticity of the user's identity with specific information.
3.4
Security policy
Regulations and practices for the management, protection, control, and release of security-related resources in computer information systems, especially sensitive information
Regulations.
3.5
Accesscontrol
Prevent unauthorized use of resources, including preventing unauthorized use of a resource.
3.6
Dataintegrity
The data has not been tampered with or destroyed in an unauthorized manner.
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GA/T 1536-2018_English be delivered?Answer: Upon your order, we will start to translate GA/T 1536-2018_English as soon as possible, and keep you informed of the progress. The lead time is typically 1 ~ 3 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GA/T 1536-2018_English with my colleagues?Answer: Yes. The purchased PDF of GA/T 1536-2018_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
|