Path:
Home >
MISC >
Page104 > GA/T 1540-2018
Price & Delivery
US$419.00 · In stock · Download in 9 secondsGA/T 1540-2018: Information security technology - Testing and evaluation criteria for personal mobile terminal security management products
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See
step-by-step procedureStatus: Valid
| Std ID | Version | USD | Buy | Deliver [PDF] in | Title (Description) |
| GA/T 1540-2018 | English | 419 |
Add to Cart
|
4 days [Need to translate]
|
Information security technology - Testing and evaluation criteria for personal mobile terminal security management products
|
Click to Preview a similar PDF
Basic data
| Standard ID | GA/T 1540-2018 (GA/T1540-2018) |
| Description (Translated English) | Information security technology - Testing and evaluation criteria for personal mobile terminal security management products |
| Sector / Industry | Public Security (Police) Industry Standard (Recommended) |
| Classification of Chinese Standard | L80 |
| Classification of International Standard | 35.040 |
| Word Count Estimation | 18,139 |
| Date of Issue | 2018-12-27 |
| Date of Implementation | 2018-12-27 |
| Issuing agency(ies) | Ministry of Public Security |
GA/T 1540-2018: Information security technology - Testing and evaluation criteria for personal mobile terminal security management products
---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology-Testing and evaluation criteria for personal mobile terminal security management products
ICS 35.040
L80
People's Republic of China Public Safety Industry Standard
Information Security Technology
Evaluation criteria for personal mobile terminal security management products
Published on December 27,.2018
2018-12-27 Implementation
Published by the Ministry of Public Security of the People's Republic of China
Contents
Foreword III
1 Scope 1
2 Normative references 1
3 Terms and definitions 1
4 Abbreviations 2
5 Inspection requirements 2
6 Functional requirements 2
7 Test method 6
8 Report format 11
9 Rating Method 13
Foreword
This standard was drafted in accordance with the rules given in GB/T 1.1-2009.
This standard was proposed by the Cyber Security and Protection Bureau of the Ministry of Public Security.
This standard is under the jurisdiction of the Information System Security Standardization Technical Committee of the Ministry of Public Security.
This standard was drafted. National Computer Virus Emergency Response Center, Seventh Division of the Eleventh Bureau of the Ministry of Public Security, and the Tianjin Municipal Public Security Bureau's network security protection
Team, Beijing Net Qintianxia Technology Co., Ltd., Beijing Jinshan Security Software Co., Ltd., Tencent Technology (Shenzhen) Co., Ltd., Beijing Qihoo Branch
Technology Co., Ltd., Beijing Anguanjia Technology Co., Ltd., Kaspersky Technology Development (Beijing) Co., Ltd., Nankai University, Jiangsu Tongfudun Information
Security Technology Co., Ltd., Hengan Jiaxin (Beijing) Technology Co., Ltd., Beijing Qixingxingchen Information Security Technology Co., Ltd., Beijing Qihoo
Technology Co., Ltd., Beijing Tianrongxin Technology Co., Ltd.
The main drafters of this standard. Chen Jianmin, Liu Yan, Zhang Junbing, Zhu Guobang, Huang Yibin, Du Zhenhua, Yang Jian, Zhang Yijing, Zhang Rui, Cao Peng,
Feng Junliang, Meng Bin, Wang Wenyi, Li Chenyi, Zhang Nan, Zhang Huarui, Jiao Riming, Shi Lei, Guan Peng, Jia Chunfu, Zhang Zhenwei, Cui Tingting, Xu Yuqing, Guo Ying,
Wang Ye.
Information Security Technology
Evaluation criteria for personal mobile terminal security management products
1 Scope
This standard specifies the inspection requirements, functional requirements, test methods, report formats, and rating methods for personal mobile terminal security management products.
This standard applies to the development and testing of personal mobile terminal security management products.
2 Normative references
The following documents are essential for the application of this document. For dated references, only the dated version applies to this article
Pieces. For undated references, the latest version (including all amendments) applies to this document.
GA 243-2000 Computer Virus Control Product Rating Guidelines
GA/T 757-2008 Program Function Inspection Method
GA 849-2009 Mobile Terminal Virus Control Product Rating Guidelines
3 terms and definitions
The terms and definitions defined in GA 243-2000, GA/T 757-2008, GA 849-2009 and the following apply to this document.
3.1
Personal mobile terminal
Portable electronic devices for personal use, including smartphones, tablets, etc.
3.2
Personal mobile terminal security management product
Products for managing personal mobile terminals and protecting personal computing environments.
3.3
Mobile terminal compliance
Mobile terminals should comply with national security policies.
3.4
Maliciousbehavior
Accessing information in mobile terminals without user authorization
3.5
System optimization
Clean up junk files on personal mobile terminal systems, start-up program management, emergency shutdown of third-party programs, file management, disks
A series of optimization functions such as management.
3.6
Traffic monitoring datatrafficmonitor
Monitor the network traffic of personal mobile terminals, and monitor the current network procedures and past network records.
...