Path:
Home >
MISC >
Page104 > GA/T 1536-2018
Price & Delivery
US$229.00 · In stock · Download in 9 secondsGA/T 1536-2018: Information security technology - Testing and evaluation criteria for detection products of host computer security
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See
step-by-step procedureStatus: Valid
| Std ID | Version | USD | Buy | Deliver [PDF] in | Title (Description) |
| GA/T 1536-2018 | English | 229 |
Add to Cart
|
3 days [Need to translate]
|
Information security technology - Testing and evaluation criteria for detection products of host computer security
|
Click to Preview a similar PDF
Basic data
| Standard ID | GA/T 1536-2018 (GA/T1536-2018) |
| Description (Translated English) | Information security technology - Testing and evaluation criteria for detection products of host computer security |
| Sector / Industry | Public Security (Police) Industry Standard (Recommended) |
| Classification of Chinese Standard | L80 |
| Classification of International Standard | 35.040 |
| Word Count Estimation | 10,176 |
| Date of Issue | 2018-12-26 |
| Date of Implementation | 2018-12-26 |
| Issuing agency(ies) | Ministry of Public Security |
GA/T 1536-2018: Information security technology - Testing and evaluation criteria for detection products of host computer security
---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology-Testing and evaluation criteria for detection products of host computer security
ICS 35.040
L80
People's Republic of China Public Safety Industry Standard
Information Security Technology
Computer host security testing product evaluation criteria
2018-12-26 release
2018-12-26 Implementation
Published by the Ministry of Public Security of the People's Republic of China
Contents
Foreword III
1 Scope 1
2 Normalized references 1
3 Terms and definitions 1
4 Inspection requirements 2
5 Test indicator requirements 2
6 Functional requirements 2
7 Test method 4
8 Report format 4
9 Rating Method 4
Foreword
This standard was drafted in accordance with the rules given in GB/T 1.1-2009.
This standard was proposed by the Cyber Security and Protection Bureau of the Ministry of Public Security.
This standard is under the jurisdiction of the Information System Security Standardization Technical Committee of the Ministry of Public Security.
This standard was drafted. National Computer Virus Emergency Response Center, Tianjin Public Security Bureau Cyber Security Defense Corps, Jiangsu Tongfu Dunxin
Information Security Technology Co., Ltd., Hengan Jiaxin (Beijing) Technology Co., Ltd., Beijing Qixingxing Information Security Technology Co., Ltd., Beijing Qihoo
Technology Co., Ltd., Beijing Tianrongxin Technology Co., Ltd., Nankai University, Beijing Antiy Network Security Technology Co., Ltd.
The main drafters of this standard. Chen Jianmin, Liu Yan, Du Zhenhua, Huang Yibin, Cao Peng, Yang Jian, Zhao Xiaoming, Zhang Yijing, Zhang Rui, Zhang Xin, Wang Wenyi,
Xiao Xinguang, Zhao Huanju, Zhang Zhenwei, Cui Tingting, Xu Yuqing, Wang Yan, Jia Chunfu, Shu Xin, Li Ju, Sun Bo, Li Dong.
Information Security Technology
Computer host security testing product evaluation criteria
1 Scope
This standard specifies the inspection requirements, test index requirements, functional requirements, test methods, and report formats of computer mainframe safety inspection products.
And rating methods.
This standard applies to the development and testing of computer host security testing products.
2 Normalized references
The following documents are essential for the application of this document. For dated references, only the dated version applies to this article
Pieces. For undated references, the latest version (including all amendments) applies to this document.
GB/T 18336.3-2015 Information Technology Security Technology Information Technology Security Evaluation Guidelines Part 3. Security Assurance Components
GA 243-2000 Computer Virus Control Product Rating Guidelines
GA/T 757-2008 Program Function Inspection Method
3 terms and definitions
GB/T 18336.3-2015, GA 243-2000, GA/T 757-2008 and the following terms and definitions apply to this
file.
3.1
Operating system security
Characterization of the confidentiality, integrity, and availability of information stored, transmitted, and processed by the operating system.
3.2
User identification
It is used to identify the identity of the user and ensure the uniqueness and legibility of the user in the system.Generally, the name and user identifier (UID)
Identify a user in the system.
3.3
Userauthentication
Confirm the authenticity of the user's identity with specific information.
3.4
Security policy
Regulations and practices for the management, protection, control, and release of security-related resources in computer information systems, especially sensitive information
Regulations.
3.5
Accesscontrol
Prevent unauthorized use of resources, including preventing unauthorized use of a resource.
3.6
Dataintegrity
The data has not been tampered with or destroyed in an unauthorized manner.
...