Path:
Home >
MISC >
Page104 > GA/T 1538-2018
Price & Delivery
US$229.00 · In stock · Download in 9 secondsGA/T 1538-2018: Information security technology - Testing and evaluation criteria for enterprise mobile terminal security management products
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See
step-by-step procedureStatus: Valid
| Std ID | Version | USD | Buy | Deliver [PDF] in | Title (Description) |
| GA/T 1538-2018 | English | 229 |
Add to Cart
|
3 days [Need to translate]
|
Information security technology - Testing and evaluation criteria for enterprise mobile terminal security management products
|
Click to Preview a similar PDF
Basic data
| Standard ID | GA/T 1538-2018 (GA/T1538-2018) |
| Description (Translated English) | Information security technology - Testing and evaluation criteria for enterprise mobile terminal security management products |
| Sector / Industry | Public Security (Police) Industry Standard (Recommended) |
| Classification of Chinese Standard | L80 |
| Classification of International Standard | 35.040 |
| Word Count Estimation | 10,182 |
| Date of Issue | 2018-12-27 |
| Date of Implementation | 2018-12-27 |
| Issuing agency(ies) | Ministry of Public Security |
GA/T 1538-2018: Information security technology - Testing and evaluation criteria for enterprise mobile terminal security management products
---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology-Testing and evaluation criteria for enterprise mobile terminal security management products
ICS 35.040
L80
People's Republic of China Public Safety Industry Standard
Information Security Technology
Evaluation Criteria for Enterprise Mobile Terminal Security Management Products
Published on December 27,.2018
2018-12-27 Implementation
Published by the Ministry of Public Security of the People's Republic of China
Contents
Foreword III
Introduction IV
1 Scope 1
2 Normative references 1
3 Terms and definitions 1
4 Abbreviations 1
5 Inspection requirements 2
6 Functional requirements 2
7 Test method 3
8 Report format 3
9 Rating Method 4
Foreword
This standard was drafted in accordance with the rules given in GB/T 1.1-2009.
This standard was proposed by the Cyber Security and Protection Bureau of the Ministry of Public Security.
This standard is under the jurisdiction of the Information System Security Standardization Technical Committee of the Ministry of Public Security.
This standard was drafted. National Computer Virus Emergency Response Center, Seventh Division of the Eleventh Bureau of the Ministry of Public Security, and the Tianjin Municipal Public Security Bureau's network security protection
Headquarters, Hengan Jiaxin (Beijing) Technology Co., Ltd., McAfee (Shanghai) Software Co., Ltd., Beijing Qixingxing Information Security Technology Co., Ltd.
Division, Beijing Tianrongxin Technology Co., Ltd.
The main drafters of this standard. Chen Jianmin, Huang Yibin, Zhu Guobang, Lu Lei, Cao Peng, Yuan Jiangtao, Zhang Leisheng, Zhang Xin, Li Dong, Meng Bin, Li Ju,
Shu Xin, Sun Bo, Cui Tingting, Xu Yuqing, Wang Yan.
Introduction
This standard details the inspection requirements, functional requirements, test methods, and report formats related to enterprise mobile terminal security management products.
And rating methods.
This standard only provides the functional requirements that enterprise mobile terminal security management products should meet.
The specific technical implementation methods and methods are not required.
Information Security Technology
Evaluation Criteria for Enterprise Mobile Terminal Security Management Products
1 Scope
This standard specifies the inspection requirements, functional requirements, test methods, report formats, and rating methods for enterprise mobile terminal security management products.
This standard applies to the development and testing of enterprise mobile terminal security management products.
2 Normative references
The following documents are essential for the application of this document. For dated references, only the dated version applies to this article
Pieces. For undated references, the latest version (including all amendments) applies to this document.
GA 243-2000 Computer Virus Control Product Rating Guidelines
GA/T 757-2008 Program Function Inspection Method
GA 849-2009 Mobile Terminal Virus Control Product Rating Guidelines
3 terms and definitions
The terms and definitions defined in GA 243-2000, GA/T 757-2008, GA 849-2009 and the following apply to this document.
3.1
Enterprise mobile terminal
Portable electronic devices used by corporate employees in corporate mobile computing environments, including smartphones and tablets.
3.2
Enterprise mobile computing enterprisemobilecomputing
A new production method adopted by the enterprise to improve productivity, so that employees can easily and quickly process the enterprise through mobile terminals.
Business affairs.
3.3
Enterprise mobile terminal security management product
Products for managing enterprise mobile terminals and protecting the security of enterprise computing environments.
3.4
Mobile terminal compliance
Mobile terminals should comply with the security policies established by the enterprise.
4 Abbreviations
The following abbreviations apply to this document.
...