US$509.00 · In stock Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 26333-2010: Evaluation specification for security in industrial control network Status: Valid
Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
GB/T 26333-2010 | English | 509 |
Add to Cart
|
4 days [Need to translate]
|
Evaluation specification for security in industrial control network
| Valid |
GB/T 26333-2010
|
PDF similar to GB/T 26333-2010
Basic data Standard ID | GB/T 26333-2010 (GB/T26333-2010) | Description (Translated English) | Evaluation specification for security in industrial control network | Sector / Industry | National Standard (Recommended) | Classification of Chinese Standard | N10 | Classification of International Standard | 25.040 | Word Count Estimation | 22,215 | Date of Issue | 2011-01-14 | Date of Implementation | 2011-06-01 | Quoted Standard | GB/T 9361-1988; GB/T 9387.2-1995; GB 17859-1999; GB/T 17903.1-2008; GB/T 17965-2000; GB/T 18272.1-2000; GB/T 18272.2-2000; GB/T 18272.3-2000; GB/T 18272.7-2006; GB/T 18336.1-2008; GB/T 18336.2-2008; GB/T 18336.3-2008; GB/T 19715.1-2005; GB/T 20000.4-2003; GB/T 20269-2006; GB/T 20270-2006; GB/T 20271-2006; GB/T 20275-2006; GB/T 20278-2006; GB/T 20281-2006; GB/T 20945-2007; GB/T 21052-2007; GB/T 22081-2008; GB/T 22239-2008; ISO/IEC TR 13335; ISO/IEC TR 13335.1; ISO/IEC 15408; ISO/IEC 17799-2000; ISO/IEC 17799-2005 | Regulation (derived from) | National Standard Approval Announcement 2011 No.111 | Issuing agency(ies) | General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China | Summary | This standard specifies the steps of assessment. Gives recommendations on assessment methods. This standard applies to security risk assessment Kontron industrial networks, the definition of the main points of the assessment. This standard is discussed in industrial control communications security network, which mainly depends on the protective measures adopted by the system. |
GB/T 26333-2010: Evaluation specification for security in industrial control network---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Evaluation specification for security in industrial control network
ICS 25.040
N10
National Standards of People's Republic of China
Industrial control network security risk assessment specification
Issued on. 2011-01-14
2011-06-01 implementation
Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China
Standardization Administration of China released
Table of Contents
Introduction Ⅲ
Introduction Ⅳ
1 Scope 1
2 Normative references 1
3 Terms and definitions 2
4 Symbols and abbreviations 3
Point 3 5 Risk Assessment
6 Characteristics 6
7 to determine the purpose of the assessment 8
8 8 assessment design and planning
11 9 develop an assessment plan
10 11 Technology Assessment
Assessment of the implementation of 1211
12 prepare an assessment report 12
Security Risk Assessment Appendix A (normative) industrial control network security gateway 13
Appendix B (normative) Field equipment industrial control network security risk assessment 15
Foreword
This standard was drafted in accordance with GB/T 1.1-2009 given rules.
Some contents of this standard may involve certain patents, the present standard of any such patent shall not bear responsibility for identification.
The standard proposed by China Machinery Industry Federation.
The standard measurement and control by the National Standardization Technical Committee of industrial processes.
This standard was drafted. Chongqing University of Posts and Telecommunications, Zhejiang University, Zhejiang Control Technology Co., Ltd., Mechanical Instrumentation Technology
Surgery Economic Research Institute, Shenyang Institute of Automation, Chinese Academy of Sciences, Dalian University of Technology, Shanghai Industrial Automation Instrument Research Institute, Shanghai Automation
Instrumentation Co., Ltd., China Silian Instrument Group Co., Ltd., Southwest University, Tianjin Instrument Group Instrument Co., Ltd., Beijing-controlled
Technology Co., Ltd.
Drafters of this standard. Wang Hao, Wang Ping, Jin Jianxiang, FENG Dong-qin, Ouyang Jinsong, Mei Ke, XU Ai-dong, Zhongchong right, Miao Xueqin, including Wei-hua, Liu Jin,
Zhang Qingjun, secretary Ming Rui, Liu Jie, Liu Feng, Yang Bin, Zhou Yong.
Introduction
With the various communication technologies are widely used in industrial control networks, in more functionality while industrial control network security asked
Problem has become increasingly prominent.
This assessment is a standard for industrial control network security risk assessment methodology. Through the industrial control network security risk assessment
You can find the network security risks by adopting appropriate security measures to make security vulnerabilities, thereby enhancing the industrial control network security.
This standard specifies the industrial control network security risk assessment methodology and general guidelines, describes industrial control network security risk assessment
The general procedure design focuses on the assessment and evaluation of the analytical program.
Industrial control network security risk assessment specification
1 Scope
This standard specifies the procedure for evaluating and gives recommendations on evaluation methods.
This standard applies to industrial control network security risk assessment, the definition of the main points of the assessment.
This standard is discussed in industrial control network communications security, which depends primarily on protective measures system used.
2 Normative references
The following documents for the application of this document is essential. For dated references, only the dated version suitable for use herein
Member. For undated references, the latest edition (including any amendments) applies to this document.
GB/T 9361-1988 computer site security requirements
GB/T 9387.2-1995 Information processing systems - Open Systems Interconnection - Basic Reference Model - Part 2. Security Architecture
GB 17859-1999 computer information system security protection classification criterion
GB/T 17903.1-2008 Information technology - Security techniques - Non - repudiation - Part 1. Overview
GB/T 17965-2000 Information technology - Open Systems Interconnection - Upper layers security model (idt ISO /IEC 10745.1995)
GB /assessment - Part 1 T 18272.1-2000 industrial process measurement and control system evaluation of system properties. General and square
Law
Assessment - Part 2 GB/T 18272.2-2000 industrial process measurement and control system evaluation of system properties. Assessor
Law
Evaluation of GB/T 18272.3-2000 industrial process measurement and control system evaluation of system properties - Part 3. System Function
Evaluation
GB/T 18272.7-2006 industrial process measurement and control system evaluation assessment - Part 7 System features. System Security
Evaluation
GB/T 18336.1-2008 Information technology - Security techniques - Evaluation criteria for IT security - Part 1. Introduction and general
Model (ISO /IEC 15408-1.2005, IDT)
GB/T 18336.2-2008 Information technology - Security techniques - Evaluation criteria for IT security - Part 2. Security functional to
Demand (ISO /IEC 15408-2.2005, IDT)
GB/T 18336.3-2008 Information technology - Security techniques - Evaluation criteria for IT security - Part 3. Security assurance to
Demand (ISO /IEC 15408-3.2005, IDT)
GB/T 19715.1-2005 Information technology IT Security Management Guide - Part 1. Concepts and models for IT Security
GB/T 20000.4-2003 Guide for standardization - Part 4. Safety aspects Standard
GB/T 20269-2006 Information Security techniques - Information security management systems requirements
GB/T 20270-2006 Information security technology security technology network infrastructure requirements
GB/T 20271-2006 Information security technology - Common security techniques requirement information system
GB/T 20275-2006 Information technology security intrusion detection system technical requirements and test evaluation methods
GB/T 20278-2006 Information security technology for network vulnerability scanning product technical requirements
GB/T 20281-2006 Information security technology firewall technology requirements and testing and evaluation approaches
GB/T 20945-2007 Information security technology information system security audit requirements and product testing and evaluation methods
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 26333-2010_English be delivered?Answer: Upon your order, we will start to translate GB/T 26333-2010_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GB/T 26333-2010_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 26333-2010_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
|