HOME   Cart(2)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189759 (19 Oct 2025)

LY/T 2170-2013 English PDF

US$1669.00 ยท In stock
Delivery: <= 10 days. True-PDF full-copy in English will be manually translated and delivered via email.
LY/T 2170-2013: Security evaluation criterion of forestry information system
Status: Valid
Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
LY/T 2170-2013English1669 Add to Cart 10 days [Need to translate] Security evaluation criterion of forestry information system Valid LY/T 2170-2013

PDF similar to LY/T 2170-2013


Standard similar to LY/T 2170-2013

LY/T 2407   LY/T 1184   LY/T 1650   LY/T 2171   LY/T 2172   LY/T 2169   

Basic data

Standard ID LY/T 2170-2013 (LY/T2170-2013)
Description (Translated English) Security evaluation criterion of forestry information system
Sector / Industry Forestry Industry Standard (Recommended)
Classification of Chinese Standard B65
Classification of International Standard 65.020.40
Word Count Estimation 68,688
Quoted Standard GB/T 5271.8; GB 17859; GB/T 22240; GB 50016; GB 50174-2008
Regulation (derived from) State Forestry Bulletin No. 14 of 2013
Issuing agency(ies) State Forestry Administration
Summary This standard specifies the basic requirements for the protection of forestry different security level of information systems, including the basic technical requirements, the basic management requirements and response measures. This standard applies to se

LY/T 2170-2013: Security evaluation criterion of forestry information system

---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Security evaluation criterion of forestry information system ICS 65.020.40 B65 People's Republic of China Forestry Industry Standard Forestry Information System Safety Assessment Guidelines Published on.2013-10-17 2014-01-01 implementation State Forestry Administration released

Content

Foreword III Introduction IV 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Forestry Information System Security Level Protection 1 4.1 Forestry Information System Security Protection Level 1 4.2 Different levels of security protection 1 4.3 Basic safety requirements 2 4.4 Three types of basic technical requirements 2 5 First level basic requirements and countermeasures 2 5.1 Technical requirements and countermeasures 2 5.1.1 Physical Security 2 5.1.2 Network Security 3 5.1.3 Host Security 4 5.1.4 Application Security 4 5.1.5 Data Security and Backup Recovery 5 5.2 Management requirements and countermeasures 5 5.2.1 Safety Management System 5 5.2.2 Security Management Agency 5 5.2.3 Personnel Safety Management 6 5.2.4 System Construction Management 6 5.2.5 System Operation and Maintenance Management 7 6 Second level basic requirements and countermeasures 9 6.1 Technical requirements and countermeasures 9 6.1.1 Physical Security 9 6.1.2 Network Security 11 6.1.3 Host Security 12 6.1.4 Application Security 13 6.1.5 Data Security and Backup Recovery 14 6.2 Management requirements and countermeasures 15 6.2.1 Safety Management System 15 6.2.2 Safety Management Agency 15 6.2.3 Personnel safety management 16 6.2.4 System Construction Management 16 6.2.5 System Operation and Maintenance Management 18 7 Third level basic requirements and countermeasures 21 7.1 Technical requirements and countermeasures 21 7.1.1 Physical Security 21 7.1.2 Network Security 23 7.1.3 Host Security 25 7.1.4 Application Security 27 7.1.5 Data Security and Backup Recovery 29 7.2 Management requirements and countermeasures 29 7.2.1 Safety Management System 29 7.2.2 Security Management Agency 30 7.2.3 Personnel safety management 31 7.2.4 System Construction Management 32 7.2.5 System Operation and Maintenance Management 34 8 Fourth level basic requirements and countermeasures 38 8.1 Technical requirements and countermeasures 38 8.1.1 Physical Security 38 8.1.2 Network Security 40 8.1.3 Host Security 42 8.1.4 Application Security 44 8.1.5 Data Security and Backup Recovery 46 8.2 Management requirements and countermeasures 47 8.2.1 Safety Management System 47 8.2.2 Security Management Agency 48 8.2.3 Personnel safety management 49 8.2.4 System Construction Management 50 8.2.5 System Operation and Maintenance Management 52 9 Level 5 Basic Requirements 56 Appendix A (Normative Appendix) Requirements for the overall safety protection capabilities of forestry information systems 57 Appendix B (Normative Appendix) Selection and use of safety requirements for important information systems in forestry 58 References 59

Foreword

This standard was drafted in accordance with the rules given in GB/T 1.1-2009. This standard is proposed and managed by the National Forestry Information Data Standardization Technical Committee (SAC/TC386). This standard was drafted. National Forestry Administration Information Center, China Science and Technology Information Security Common Technology National Engineering Research Center Co., Ltd. The main drafters of this standard. Yang Xinmin, Wu Rigen, Li Shufang, Wen Zhanqiang, Bai Ying, Zhang Yang, Yan Shaoliang, Xue Zhengyu.

Introduction

This standard is formulated in accordance with the national information security level protection management regulations. Forestry has a high degree of informationization and high business continuity requirements. The capacity and processing power of information systems are highly demanding. This standard is based on the actual situation of forestry and the information security technology information system. The relevant requirements of the Basic Requirements for Safety Level Protection (GB/T 22239-2008) have been clarified, refined and adjusted, and forestry has been proposed and regulated. Technical requirements for different levels of information systems, and technical and management responses for different levels of security requirements, applicable to Guide forestry in accordance with the requirements of grade protection for safety construction, evaluation and supervision. In the text of this standard, the contents of the definition, refinement and adjustment are indicated in italics. Forestry Information System Safety Assessment Guidelines

1 Scope

This standard specifies the basic protection requirements for forestry security protection level information systems, including basic technical requirements and basic management requirements. And countermeasures. This standard is applicable to guide the safety construction, rectification, evaluation, supervision and management of forestry hierarchical information systems.

2 Normative references

The following documents are indispensable for the application of this document. For dated references, only dated versions apply to this article. Pieces. For undated references, the latest edition (including all amendments) applies to this document. GB/T 5271.8 Information technology vocabulary Part 8. Security GB 17859 Computer Information System Security Protection Level Division Guidelines GB/T 22240 Information Security Technology Information System Security Level Protection Rating Guide GB 50016 Building Design Fire Code GB 50174-2008 Electronic Information System Room Design Specification

3 Terms and definitions

The following terms and definitions as defined in GB/T 5271.8 and GB 17859 apply to this document. 3.1 Security protection capability The system is able to withstand threats, detect security incidents, and restore the previous state after the system is compromised.

4 Forestry Information System Security Level Protection

4.1 Forestry Information System Security Protection Level The forestry information system is destroyed by national security and society according to its importance in national security, economic construction and social life. The degree of harm to the order, the stability of the forestry market, the public interest, and the legitimate rights and interests of investors, legal persons and other organizations is divided into five from low to high. For the classification, the definition of classification is given in GB/T 22240. 4.2 Different levels of security protection The basic security protection capabilities of different levels of information systems are as follows. First-level security protection. should be able to protect the system from malicious attacks from individual, threatened sources with few resources, The damage caused by the general natural disaster and other threats of considerable harm can be restored after the system is damaged. Some features. Second-level security protection. should be able to protect the system from evil sources from small external organizations with small resources Important resources caused by intentional attacks, general natural disasters, and other threats of considerable harm can reveal important security

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of LY/T 2170-2013_English be delivered?

Answer: Upon your order, we will start to translate LY/T 2170-2013_English as soon as possible, and keep you informed of the progress. The lead time is typically 6 ~ 10 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of LY/T 2170-2013_English with my colleagues?

Answer: Yes. The purchased PDF of LY/T 2170-2013_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.