HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189759 (19 Oct 2025)

GB/T 31495.1-2015 English PDF

US$189.00 · In stock
Delivery: <= 3 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 31495.1-2015: Information security technology -- Indicator system of information security assurance and evaluation methods -- Part 1: Concepts and model
Status: Valid
Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GB/T 31495.1-2015English189 Add to Cart 3 days [Need to translate] Information security technology -- Indicator system of information security assurance and evaluation methods -- Part 1: Concepts and model Valid GB/T 31495.1-2015

PDF similar to GB/T 31495.1-2015


Standard similar to GB/T 31495.1-2015

GB/T 31509   GB/T 31722   GB/T 31505   GB/T 31497   GB/T 31500   GB/T 31495.2   

Basic data

Standard ID GB/T 31495.1-2015 (GB/T31495.1-2015)
Description (Translated English) Information security technology -- Indicator system of information security assurance and evaluation methods -- Part 1: Concepts and model
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard L80
Classification of International Standard 35.040
Word Count Estimation 9,920
Date of Issue 2015-05-15
Date of Implementation 2016-01-01
Quoted Standard GB/T 25069-2010
Regulation (derived from) National Standard Announcement 2015 No. 15
Issuing agency(ies) General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China
Summary This Standard specifies the basic concepts of information security assessment, establish a general model of information security evaluation. This section applies to information security evaluation.

GB/T 31495.1-2015: Information security technology -- Indicator system of information security assurance and evaluation methods -- Part 1: Concepts and model


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
. Information security technology Indicator system of information security assurance and evaluation methods Part 1. Concepts and model ICS 35.040 L80 National Standards of People's Republic of China Information Security techniques - Information security Index System And evaluation method Part 1. Concepts and models Part 1. Conceptsandmodel Issued on. 2015-05-15 2016-01-01 implementation Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China Standardization Administration of China released

Table of Contents

Introduction Ⅲ Introduction Ⅳ 1 Scope 1 2 Normative references 1 3 Terms and definitions 4 Information Security Model 1 5 Information Security Evaluation Model 2 Reference 4

Foreword

GB/T 31495 "Information Security Information Security System Evaluation Index" is divided into the following three parts. --- Part 1. Concepts and models; --- Part 2. Index System; --- Part 3. Implementation Guide. This section GB/T Part of 131,495. This section drafted in accordance with GB/T 1.1-2009 given rules. Please note that some of the content of this document may involve patents. Release mechanism of the present document does not assume responsibility for the identification of these patents. This part of the National Security Standardization Technical Committee (SAC/TC260) and focal points. This section is drafted. State Information Center, the State Press and Publication Administration of Radio Supervision Center, China Information Security Evaluation Center, China Electric Holdings, China Mobile Communications Group, Dalian University of Technology, the National Energy Administration Information Center, Jiangsu Information Center, China Civil Aviation University of China Electric Power Research Institute. The main drafters of this section. Dequan, LU Xin, Wang Xianlei, Wang Changsheng, Guo Yanqing, Yang full moon, Lishou Peng, Lv Hanyang, Du Wei, Xiao Ying, Mo Zhang Nan, Luo Cheng, Wu Zhijun, a Young Man, Xie Donghui, Cheng Lu, Hong Hu liter, Sun Xiaohong, Xu Hao, Zhou Chi, Chen Min, the Lei Jin, Fan Hui, Kunlun high, Li Peng, Li Hui.

Introduction

GB/T 31495 in accordance with relevant national requirements for information security work, the proposed information security concepts and model evaluation Index System and Implementation Guide. 31495 consists of three parts. Part 1 describes the various parts of this standard on the basis of common concepts, and gives information security Concepts and models for information security evaluation model gives a measure of indicators; Part 2 In the first part of the model guidance given letter Income security index system and index measurement process; Section 3 presents the evaluation of the implementation of information security should comply with the requirements of stream Processes and methods. 31495 is mainly used for. information security posture government departments judgment and macro support decision-making; and a heavy-based information network Information security management to management of information systems departments and operating units to provide support. Information Security techniques - Information security Index System And evaluation method Part 1. Concepts and models

1 Scope

GB/T 31495 in this section defines the basic concepts of information security assessment, established the general information security evaluation model. This section applies to information security evaluation.

2 Normative references

The following documents for the application of this document is essential. For dated references, only the dated version suitable for use herein Member. For undated references, the latest edition (including any amendments) applies to this document. GB/T 25069-2010 Information security technology terms

3 Terms and Definitions

GB/T 25069-2010 and as defined in the following terms and definitions apply to this document. 3.1 Information Security informationsecurityassurance Security attributes and functions of information and information systems, the efficiency of the act or process of a series of appropriate safeguards. 3.2 Information Security Evaluation evaluationofinformationsecurityassurance Evidence collected information security, and access to the process and means of information security values. 3.3 Information security measures measuresforinformationsecurityassurance In order to achieve the purpose of the collection of information security used to protect instruments. 3.4 Information security capabilities capabilityofinformationsecurityassurance Physical security safeguards are reflected in defense, response, and recovery characteristics. 3.5 Information Security effect effectsofinformationsecurityassurance The level of protection is to achieve information security objectives and attributes of the entity.

4 Information Security Model

Information security model is established by using a process approach. Figure 1 illustrates an information security safeguards are established according to security needs of stakeholders, formed to protect the ability to achieve security Process effect. According to stakeholders, the protection effect of feedback, can be dynamically adjusted safeguards to better meet security needs.

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 31495.1-2015_English be delivered?

Answer: Upon your order, we will start to translate GB/T 31495.1-2015_English as soon as possible, and keep you informed of the progress. The lead time is typically 1 ~ 3 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 31495.1-2015_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 31495.1-2015_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.