US$279.00 ยท In stock Delivery: <= 3 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 37025-2018: Information security technology -- Security technical requirements of data transmission for internet of things Status: Valid
Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
GB/T 37025-2018 | English | 279 |
Add to Cart
|
3 days [Need to translate]
|
Information security technology -- Security technical requirements of data transmission for internet of things
| Valid |
GB/T 37025-2018
|
PDF similar to GB/T 37025-2018
Basic data Standard ID | GB/T 37025-2018 (GB/T37025-2018) | Description (Translated English) | Information security technology -- Security technical requirements of data transmission for internet of things | Sector / Industry | National Standard (Recommended) | Classification of Chinese Standard | L80 | Classification of International Standard | 35.040 | Word Count Estimation | 14,137 | Date of Issue | 2018-12-28 | Date of Implementation | 2019-07-01 | Issuing agency(ies) | State Administration for Market Regulation, China National Standardization Administration |
GB/T 37025-2018: Information security technology -- Security technical requirements of data transmission for internet of things ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology--Security technical requirements of data transmission for internet of things
ICS 35.040
L80
National Standards of People's Republic of China
Information security technology
IoT data transmission security technical requirements
Published on.2018-12-28
2019-07-01 implementation
State market supervision and administration
China National Standardization Administration issued
Content
Foreword I
1 Scope 1
2 Normative references 1
3 Terms and Definitions 1
4 Abbreviations 2
5 IoT Data Transmission Security Overview 2
5.1 Internet of Things Data Transmission Security 2
5.2 Security protection range 3
5.3 Safety Rating Principle 4
6 Basic level safety technical requirements 4
6.1 Data Transmission Integrity 4
6.2 Data Transfer Availability 4
6.3 Data Transmission Privacy 5
6.4 Data Transfer Trust 5
6.5 Information Transmission Strategies and Procedures 5
6.6 Information Transmission Protocol 5
6.7 Approval and update of the transmission protocol 5
7 Enhanced Security Technical Requirements 5
7.1 Data Transmission Integrity 5
7.2 Data Transfer Availability 5
7.3 Data Transmission Privacy 6
7.4 Data Transfer Trust 6
7.5 Information Transmission Strategies and Procedures 6
7.6 Information Transmission Protocol 6
7.7 Approval and update of the transmission protocol 6
7.8 Data transmission confidentiality 6
7.9 Logs and Auditing 6
Appendix A (informative) Analysis of data transmission security issues under the IoT three-layer reference model 7
Appendix B (informative) Data transmission security capability requirements and self-checking table 9
Reference 11
Foreword
This standard was drafted in accordance with the rules given in GB/T 1.1-2009.
Please note that some of the contents of this document may involve patents. The issuing organization of this document is not responsible for identifying these patents.
This standard is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260).
This standard was drafted. Beijing University of Technology, China Electronics Technology Standardization Institute, Beijing University of Posts and Telecommunications, the Third Institute of the Ministry of Public Security,
Central University of Finance and Economics, Institute of Software, Chinese Academy of Sciences, Xi'an University of Electronic Science and Technology, Wuxi Internet of Things Industry Research Institute, Beijing Zhongdian Puhua Information
Technology Co., Ltd., Henan University of Science and Technology, Chongqing Three Gorges College, China Ping An Insurance (Group) Co., Ltd.
The main drafters of this standard. Yang Zhen, Fan Kefeng, Ding Zhiming, Lai Yingxu, Liu Xiangang, Huang Jian, Li Jian, Gong Jiezhong, Li Lin, Li Yide, Ma Zhanyu,
Duan Lijuan, Qin Hua, Ding Liping, Gu Jian, Qi Li, Yang Ming, Chen Shuyi, Qi Qingyi, Zhang Zhiyong, Cao Zhanfeng, Nie Xiangfei, Tu Shanshan, He Tonghai, Wei Xin,
Wu Yazhen, Li Tong, Liu Jing, Cai Wei, Zou Shihong.
Information security technology
IoT data transmission security technical requirements
1 Scope
This standard specifies the data transmission security classification of the Internet of Things (except industrial control terminals) and its basic level and enhanced level security technical requirements.
This standard is applicable to the planning, construction, operation and management of the data transmission security of the Internet of Things.
2 Normative references
The following documents are indispensable for the application of this document. For dated references, only dated versions apply to this article.
Pieces. For undated references, the latest edition (including all amendments) applies to this document.
GB/T 33474-2016 IoT Reference Architecture
3 Terms and definitions
The following terms and definitions apply to this document.
3.1
Internet of Things Internetofthings
Realize information on physical and virtual worlds through sensing devices, in accordance with agreed protocols, connecting objects, people, systems, and information resources
And respond to the intelligent service system.
[GB/T 33745-2017, definition 2.1.1]
3.2
Sensor transducer/sensor
A device or device that can be measured and converted into usable output signals according to a certain rule, usually by sensitive components and conversion components
composition.
[GB/T 7665-2005, definition 3.1.1]
3.3
Sensing device sensingdevice
A device that can acquire object information and provide access to the network.
[GB/T 33745-2017, definition 2.1.9]
Note. Perceptual devices with higher computing power can also collect and/or perform operations on objects or environments.
3.4
Transmission security
Protects the integrity, confidentiality, availability, and customization of information transmitted over the network.
3.5
Communication reference architecture interface communicationreferencearchitectureinterface
From the perspective of interconnection between IoT entities, an interface describing the network communication relationships between IoT domains and intra-domain entities.
Note. According to different application scenarios of the Internet of Things, communication can adopt interfaces such as wireless or wired communication.
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 37025-2018_English be delivered?Answer: Upon your order, we will start to translate GB/T 37025-2018_English as soon as possible, and keep you informed of the progress. The lead time is typically 1 ~ 3 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GB/T 37025-2018_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 37025-2018_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
|