HOME   Cart(1)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189759 (19 Oct 2025)

GA/T 672-2006 English PDF

Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GA/T 672-2006EnglishRFQ ASK 7 days [Need to translate] Information security technology--Evaluation criteria for terminal computer system of security classified protection Obsolete GA/T 672-2006

PDF similar to GA/T 672-2006


Standard similar to GA/T 672-2006

GB/T 37230   GB 13954   GA/T 671   GA/T 543.23   GA 667   GA/T 681   

Basic data

Standard ID GA/T 672-2006 (GA/T672-2006)
Description (Translated English) Information security technology--Evaluation criteria for terminal computer system of security classified protection
Sector / Industry Public Security (Police) Industry Standard (Recommended)
Classification of Chinese Standard A90
Classification of International Standard 35.040
Word Count Estimation 39,315
Date of Issue 2006-12-28
Date of Implementation 2007-02-01
Quoted Standard GB 17859-1999; GB/T 20271-2006; GB/T 20272-2006; GA/T 671-2006
Issuing agency(ies) Ministry of Public Security
Summary This standard specifies the evaluation method of the terminal computer system. This standard applies to the evaluation of the terminal computer system developed in accordance with GA/T 671-2006 "Information security technology terminal computer system security level technical requirements".

GA/T 672-2006: Information security technology--Evaluation criteria for terminal computer system of security classified protection


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology--Evaluation criteria for terminal computer system of security classified protection ICS 35.040 A90 People's Republic of China Public Safety Industry Standard Information security technology Terminal computer system security level assessment criteria Released on December 28,.2006 2007-02-01 implementation Ministry of Public Security

Content

Foreword I Introduction II 1 Scope 1 2 Normative references 1 3 Terms, definitions and abbreviations 1 3.1 Terms and Definitions 1 3.2 Abbreviations 2 4 Information Security Technology Terminal Computer System Security Level Evaluation Criteria 3 4.1 First level. user independent protection level 3 4.1.1 Security Function Requirements 3 4.1.2 SSOTCS Self Security 5 4.1.3 SSOTCS Design and Implementation 5 4.2 Level 2. System Audit Protection Level 8 4.2.1 Security function requirements 8 4.2.2 SSOTCS Self-protection 14 4.2.3 SSOTCS Design and Implementation 14 4.3 Level 3. Security Mark Protection Level 19 4.3.1 Security Function Requirements 19 4.3.2 SSOTCS Self Security Protection 27 4.3.3 SSOTCS Design and Implementation 27 Reference 35

Foreword

This standard was proposed by the Ministry of Public Security Information System Security Standardization Technical Committee. This standard is under the jurisdiction of the National Information Security Standardization Technical Committee. This standard was drafted. Ministry of Public Security Computer Information System Security Product Quality Supervision and Inspection Center. The main drafters of this standard. Qiu Yuhua, Gu Jian, Jing Yuyuan, Li Yi, Shen Liang, Zhang Wei, Zou Chunming, Ma Haiyan, Yu You.

Introduction

This standard is used to guide evaluators on how to evaluate terminal computer systems at various levels of security. The terminal computer system is responsible for a large amount of data storage, processing and transmission in the computer information system, which is the closest to the user. Contact. The security of the terminal computer system plays a vital role in the security of the entire information system. Letter at each security level In the information system, the terminal computer system should also reach the corresponding security level. This standard is based on the relevant requirements of the "Technical Requirements for Security Levels of Information Security Technology Terminal Computer Systems", for the first, second and third The terminal computer system of the level proposes a specific evaluation method, which can provide guidance for testing and development of the terminal computer system. Information security technology Terminal computer system security level assessment criteria

1 Scope

This standard specifies the evaluation method for the terminal computer system. This standard applies to the development of GA/T 671-2006 "Information Security Technology Terminal Computer System Security Level Technical Requirements" Evaluation of the terminal computer system.

2 Normative references

The terms in the following documents become the terms of this standard by reference in this standard. Any dated reference document, followed by Some amendments (not including errata content) or revisions do not apply to this standard. However, parties to agreements based on this standard are encouraged to Whether the latest version of these files can be used. For undated references, the latest edition applies to this standard. GB 17859-1999 Computer Information System Security Protection Level Division Guidelines GB/T 20271-2006 Information security technology information system general safety technical requirements GB/T 20272-2006 Information security technology operating system security technical requirements GA/T 671-2006 Information security technology terminal computer system security level technical requirements 3 Terms, definitions and abbreviations 3.1 Terms and definitions GB 17859-1999, GB/T 20271-2006 and GB/T 20272-2006 established and the following terms and definitions apply to This standard. 3.1.1 A computer system used by individuals is an important part of the information system, providing support for users to access network servers. terminal The computer system behaves in two forms, a desktop computer system and a laptop computer system. Terminal computer system Systems, operating systems, and application systems (including tools and other application software that support users accessing web servers) composition. 3.1.2 A property in which an entity with this property always achieves its intended purpose in the expected behavior and manner. 3.1.3 A process of computing the hash value of an entity using a cryptographic hash algorithm. 3.1.4 The hash value measured by the entity in a trusted state can be used as a basis for integrity check. 3.1.5 A trusted entity is the basis for making trusted metrics within a terminal computer system.