Path:
Home >
MISC >
Page104 > GA/T 1349-2017
Price & Delivery
US$419.00 · In stock · Download in 9 secondsGA/T 1349-2017: Information security technology--Knowledge library interface specification for cybersecurity classified protection
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See
step-by-step procedureStatus: Valid
| Std ID | Version | USD | Buy | Deliver [PDF] in | Title (Description) |
| GA/T 1349-2017 | English | 419 |
Add to Cart
|
4 days [Need to translate]
|
Information security technology--Knowledge library interface specification for cybersecurity classified protection
|
Click to Preview a similar PDF
Basic data
| Standard ID | GA/T 1349-2017 (GA/T1349-2017) |
| Description (Translated English) | Information security technology--Knowledge library interface specification for cybersecurity classified protection |
| Sector / Industry | Public Security (Police) Industry Standard (Recommended) |
| Classification of Chinese Standard | L80 |
| Classification of International Standard | 35.040 |
| Word Count Estimation | 18,155 |
| Date of Issue | 2017-11-20 |
| Date of Implementation | 2017-11-20 |
| Issuing agency(ies) | Ministry of Public Security |
GA/T 1349-2017: Information security technology--Knowledge library interface specification for cybersecurity classified protection
---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology--Knowledge library interface specification for cybersecurity classified protection
ICS 35.040
L80
Public Safety Industry Standard of the People's Republic of China
Information Security Technology
Network Security Level Protection Specialized Knowledge Base Interface Specification
Published on.2017-11-20
2017-11-20 Implementation
The Ministry of Public Security
Foreword
This standard was drafted in accordance with the rules given in GB/T 1.1-2009.
This standard was proposed by the Ministry of Public Security Cyber Security Bureau and the Third Institute of the Ministry of Public Security.
This standard is under the jurisdiction of the Ministry of Public Security Information System Security Standardization Technical Committee.
This standard was drafted by the Third Institute of the Ministry of Public Security, Beijing Suifang Information Technology Co., Ltd., and Zhongguancun Information Security Evaluation Alliance.
The main drafters of this standard. Tao Yuan, Guo Yiming, Luo Yi, Li Moyan, Zhang Yuxiang, Yuan Jing, Wu Weixiang, Wang Wei, Shen Yu, Liu Jing, Ma Siyuan,
Yu Chunlan, Zheng Guogang, Song Wenchao, Sang Yuchen, Wang Chuanning, Liu Tingzheng, and Yang Xiaomei.
Information Security Technology
Network Security Level Protection Specialized Knowledge Base Interface Specification
1 Scope
This standard stipulates the interface of the special knowledge base for the protection of network security levels, so that the network security level encapsulated in the knowledge base can be used to protect relevant standards.
Quasi-, operational instructions, analysis models, and rule bases can be called up by the assessment tools so that the assessment tools can collect and analyze data according to the knowledge base.
Built-in knowledge, models, and rules for automated analysis.
This standard applies to the provision of standardized interfaces for automated analysis tools for network security level protection work, which is conducive to improving network security.
Standardization of full-level protection work.
2 Normative references
The following documents are indispensable for the application of this document. For dated references, only dated versions apply to this article
Pieces. For undated references, the latest version (including all amendments) applies to this document.
GB 17859-1999 Guidelines for the classification of security levels for computer information systems
GB/T 22239-2008 Information Security Technology Information System Security Level Protection Basic Requirements
GB/T 25069-2010 Information Security Technical Terms
GB/T 28448-2012 Information Security Technology Information System Security Level Protection Evaluation Requirements
GA/T 1389-2017 Information Security Technology Network Security Level Protection Rating Guide
3 Terms and definitions
GB 17859-1999, GB/T 22239-2008, GB/T 25069-2010, GB/T 28448-2012 and GA/T 1389-
The definitions of.2017 and the following terms and definitions apply to this document.
3.1
Quantitative analysis of security conditions quantitativeanalysisofsecuritysituation
Analyze the provided data according to the level protection criteria and analysis model, and provide the analysis objects (including information system components and information
Systems, etc.) Quantitative information on the compliance of security protections.
3.2
Safety status simulation rulessimulationruleofsecuritysituation
In order to obtain the security status of the measured information system or the components of the tested information system, the rules of the simulation environment are built, including certain network settings.
Preparation, performance, and configuration information.
3.3
Information system component componentofinformationsystem
The components of the information system include network devices, security devices, host systems, web site application services, database systems, and so on.
...