US$679.00 ยท In stock Delivery: <= 5 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 37091-2018: Information security technology -- Security office USB disk technology requirement Status: Valid
Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
GB/T 37091-2018 | English | 679 |
Add to Cart
|
5 days [Need to translate]
|
Information security technology -- Security office USB disk technology requirement
| Valid |
GB/T 37091-2018
|
PDF similar to GB/T 37091-2018
Basic data Standard ID | GB/T 37091-2018 (GB/T37091-2018) | Description (Translated English) | Information security technology -- Security office USB disk technology requirement | Sector / Industry | National Standard (Recommended) | Classification of Chinese Standard | L80 | Classification of International Standard | 35.040 | Word Count Estimation | 34,375 | Date of Issue | 2018-12-28 | Date of Implementation | 2019-07-01 | Issuing agency(ies) | State Administration for Market Regulation, China National Standardization Administration |
GB/T 37091-2018: Information security technology -- Security office USB disk technology requirement ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology--Security office USB disk technology requirement
ICS 35.040
L80
National Standards of People's Republic of China
Information security technology
Safety office U disk security technical requirements
Published on.2018-12-28
2019-07-01 implementation
State market supervision and administration
China National Standardization Administration issued
Content
Foreword III
1 Scope 1
2 Normative references 1
3 Terms, definitions and abbreviations 1
3.1 Terms and Definitions 1
3.2 Abbreviations 1
4 Evaluation object description 2
5 Security Issue Definition 3
5.1 Asset 3
5.2 Threat 3
5.3 Organizational Security Policy 4
5.4 Hypothesis 4
6 Security purposes 4
6.1 TOE Security Purpose 4
6.2 Environmental Safety Objectives 5
7 Safety requirements 6
7.1 Security Function Requirements 6
7.2 Security requirements 11
8 Basic Principles 21
8.1 Basic principles of security purposes 21
8.2 Basic principles of safety requirements 24
8.3 Component Dependencies 25
Reference 29
Foreword
This standard was drafted in accordance with the rules given in GB/T 1.1-2009.
Please note that some of the contents of this document may involve patents. The issuing organization of this document is not responsible for identifying these patents.
This standard is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260).
This standard was drafted. China Information Security Evaluation Center, China Railway Principal (Beijing) Information Security Technology Co., Ltd., Beijing Beixinyuan Soft
Parts Co., Ltd., Net God Information Technology (Beijing) Co., Ltd.
The main drafters of this standard. Zhang Baofeng, Deng Hui, Zhang Yibin, Zhang Wei, Li Fengjuan, Wu Yushu, Xu Yuan, Mao Junjie, Rao Huayi, Tang Sanping,
He Yue, Li Jiyong, Bi Yongdong, Guo Ying, Zhang Qiang.
Information security technology
Safety office U disk security technical requirements
1 Scope
This standard specifies the safety functional requirements and safety requirements for the safety protection of EAL2 and EAL3 security office U disk.
Full security requirements.
This standard is applicable to the testing and evaluation of security office U disk, and can also be used to guide the research and development of such products.
2 Normative references
The following documents are indispensable for the application of this document. For dated references, only dated versions apply to this article.
Pieces. For undated references, the latest edition (including all amendments) applies to this document.
GB/T 18336-2015 (all parts) Information technology security technology information technology security assessment criteria
GB/T 20984-2007 Information Security Technology Information Security Risk Assessment Specification
GB/T 25069-2010 Information Security Technology Terminology
GB/T 28458-2012 Information security technology security vulnerability identification and description specification
3 Terms, definitions and abbreviations
3.1 Terms and definitions
GB/T 18336-2015, GB/T 20984-2007, GB/T 25069-2010 and GB/T 28458-2012 as defined by
The following terms and definitions apply to this document.
3.1.1
Security office U disk securityofficeUSBdisk
A connection between a user and a trusted network or a PC in a non-trusted network based on a USB interface to implement application functions and security functions
Mobile storage media. Such as information exchange between users and PCs, user authentication, security auditing, information encryption, information storage, and so on.
3.2 Abbreviations
The following abbreviations apply to this document.
CM. Configuration Management (ConfigurationManagement)
EAL. Evaluation AssuranceLevel
PIN. Personal Identification Number (PersonalIdentificationNumber)
SF. Security Function (SecurityFunction)
SFP. Security Function Policy (SecurityFunctionPolicy)
ST. Security Target (SecurityTarget)
TOE. Evaluation object (TargetofEvaluation)
TSF. TOE Security Function (TOESecurityFunctionality)
|