共找到 1027 条与 数据加密 相关的标准,共 69 页
Information security technology—Security technical requirements and testing and evaluation approaches for antivirus gateway products
Information security technology—Guidelines of trusted identity technology for website
GB/T20985 的本部分提出了信息安全事件管理的基本概念和过程阶段,并将这些概念与结构化方法的原理相结合来发更、报告.评估和响应事件,以及进行经验总结。 本部分给出的事件管理原理是通用的,适用于任何类型,规模或性质的组织。 组织可根据其业务的类型、规模和性质,关联信息安全风险状况,调整本部分给出的指南。 本部分也适用于提供信息安全事件管理服务的外部组织。
Information technology - Security techniques - Information security incident management - Part 1: Principles of incident management
Information security technology—SM2 cryptographic algorithm encrypted signature message syntax specification
Information security technology—Security reference architecture of cloud computing
Information security technology—Security technology specifications of mobile e-government system
Information security technology—Requirement and code of conduct for security testing bodies of information technology products
Information security technology—Specification on the job skills of certificate authority employees
Information security technology—Security technical requirements and testing and evaluation approaches for application software of smart mobile terminals
Information security technology—Technology requirements for personal information protection of smart mobile terminal
Information technology—Security techniques—Anonymous entity authentication—Part 1: General
Information security technology—Security technology requirements and testing and evaluation approaches for data storage of mobile intelligent terminals
Information security technology—Technical requirements and testing evaluation approaches of information system security management platform products
Information security technology—Smart card reader security technology requirements(EAL4+)
Information security technology—Security technical requirements and testing and evaluation approachs for operating system of smart mobile terminals
Information security technology—The assessment method for security capability of cloud computing service
Technical specification of NFC security—Part 2: Security mechanism requirements
Technical specification of NFC security—Part 1: NFCIP-1 security services and protocol
Information security technology—Technology requirements for electronic payment of mobile terminal security based on short-range radio communication technology
GB/Z 24294的本部分明确了互联网电子政务分域控制的两个阶段,在接入控制阶段,对接入控制结构、接入安全设备功能、接入认证、接入控制规则、接入控制管理等方面给出指南性建议要求;在安全交换阶段,对安全交换模式、定制数据安全交换要求、数据流安全交换要求给出指南性建议要求。 本部分适用于没有电子政务外网专线或没有租用通信网络专线条件的组织机构,基于互联网开展不涉及国家秘密的电子政务安全接入控制策略设计、工程实施与系统研发,为管理人员、工程技术人员、信息安全产品提供者进行信息安全规划与建设提供管理和技术参考。涉及国家秘密,或所存储、处理、传输信息汇聚后可能涉及国家秘密的,按照国家保密规定和标准执行。
Information security technology.Guide of implementation for Internet-based e-government information security.Part 2:Access control and secure exchange
Copyright ©2007-2022 ANTPEDIA, All Rights Reserved
京ICP备07018254号 京公网安备1101085018 电信与信息服务业务经营许可证:京ICP证110310号