HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189759 (19 Oct 2025)

GA/T 700-2007 English PDF

Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GA/T 700-2007English219 Add to Cart 3 days [Need to translate] Information security technology--Classification criterion for intrusion of computer network Obsolete GA/T 700-2007

PDF similar to GA/T 700-2007


Standard similar to GA/T 700-2007

GB/T 37230   GB 13954   GA/T 671   GA/T 704.16   GA/T 704.14   GA/T 698   

Basic data

Standard ID GA/T 700-2007 (GA/T700-2007)
Description (Translated English) Information security technology--Classification criterion for intrusion of computer network
Sector / Industry Public Security (Police) Industry Standard (Recommended)
Classification of Chinese Standard A90
Classification of International Standard 35.240
Word Count Estimation 5,585
Date of Issue 2007-05-14
Date of Implementation 2007-07-01
Issuing agency(ies) Ministry of Public Security
Summary This standard specifies the detailed requirements for computer network intrusion classification. This standard is applicable to the design and implementation of network event related products. The testing and management of network intrusion can also refer to the use.

GA/T 700-2007: Information security technology--Classification criterion for intrusion of computer network


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology - Classification criterion for intrusion of computer network ICS 35.240 A90 People's Republic of China Public Security Industry Standards Information security technology computer network intrusion grading requirements Posted 2007-05-14 2007-07-01 implementation People's Republic of China Ministry of Public Security

Foreword

This standard was proposed by the Ministry of Public Security Public Information Network Security Supervision Bureau. This standard is under the jurisdiction of the Ministry of Public Security Information System Standardization Technical Committee. This standard was drafted. Ministry of Public Security of Computer Information System Security Product Quality Supervision and Inspection Center. Drafters of this standard. Shen Liang, Gu Jian. Information security technology computer network intrusion grading requirements

1 Scope

This standard specifies the requirements for such a computer network intrusion classification. This standard applies to the design and implementation of network events related products, to carry out the test network intrusion, management can also refer to use.

2 Terms and definitions

The following terms and definitions apply to this standard. 2.1 Protection systems and services from accidental or malicious destruction, the system can guarantee continuous and reliable to run properly, the network service is not Interrupt. 2.2 Unintentional or malicious destruction of network security intrusion or an attempted intrusion behavior on the network. 2.3 Potential intruder, premeditated, unauthorized ability to render the system unreliable or unusable. 2.4 Information access and disclosure of licensing restrictions. 2.5 Information can be timely and reliable access. 2.6 Credible and complete information.

3 computer network intrusions

Network security by the confidentiality, availability and integrity of the three security attributes. Intruders use various means of network intrusion, straight He received a threat to the safety of these three attributes. 3.1 Confidentiality 3.1.1 unauthorized access 3.1.1.1 monitor information Use of an unauthorized intruder monitoring, interception and other means to secure the transmission of information in unprotected networks pose a threat. For example, network In the presence of network protocol analysis tool. 3.1.1.2 Information Detection Intruder using active means of access, there is a threat of unauthorized access to read the acquired information. According to the invaders want to get information