GBT20009-2005 信息安全技术 数据库管理系统安全评估准则 - 下载地址.pdf

GBT20009-2005 信息安全技术 数据库管理系统安全评估准则 - 下载地址.pdf

ID:423106

大小:1.40 MB

页数:35页

时间:2017-07-31

GBT20009-2005 信息安全技术 数据库管理系统安全评估准则 - 下载地址.pdf_第1页
GBT20009-2005 信息安全技术 数据库管理系统安全评估准则 - 下载地址.pdf_第2页
GBT20009-2005 信息安全技术 数据库管理系统安全评估准则 - 下载地址.pdf_第3页
GBT20009-2005 信息安全技术 数据库管理系统安全评估准则 - 下载地址.pdf_第4页
GBT20009-2005 信息安全技术 数据库管理系统安全评估准则 - 下载地址.pdf_第5页
资源描述:

《GBT20009-2005 信息安全技术 数据库管理系统安全评估准则 - 下载地址.pdf》由会员上传分享,免费在线阅读,更多相关内容在行业资料-天天文库

1、ICS35.020L09石黔中华人民共和国国家标准GB/T20009-2005信息安全技术数据库管理系统安全评估准则Informationsecuritytechnology-Databasemanagementsystemssecurityevaluationcriteria2005-11-11发布2006-05-01实施.www.bzxzk.com中华人民共和国国家质量监督检验检疫总局发布.中国国家标准化管理委员会GB/T20009-2005目次习V9Ua1范围规范性引用文件术语和定义⋯⋯4安全环境⋯4.1物理方面4.2人员方面4.

2、3连通性方面5评估内容二5.1用户自主保护级5.11自主访问控制5.I2身份鉴别数据完整性:_{_:肖乙Q乙n乙数据传输5.1.5资源利用5.1.6安全功能保护﹃内6口八nnJ安全管理5.1.8配置管理5.1.9安全功能开发过程·⋯5.1.10测试···············⋯⋯5.1.11指导性文档······⋯⋯5.1.12交付和运行······⋯⋯5.2系统审计保护级····⋯⋯5,2,1自主访问控制5.2.2身份鉴别,,,·,·⋯⋯5.2.3客体重用5.2.4审计⋯“·‘’‘”“”’‘”’‘’5.2.5数据完整性·······

3、··一5.2.6数据传输········⋯⋯”5.2.7资源利用············一5.2.8安全功能保护······一5.2.9安全管理···········⋯5.2.10生存周期支持····⋯⋯5.2.n配置管理·········⋯⋯5.2,12安全功能开发过程一5.2.13测试·······一““‘”””.www.bzxzk.com5.2.14指导性文档·······⋯⋯.GB/T20009-20055.2.15交付和运行····················································

4、········⋯⋯,.....········....·.·······.⋯⋯753安全标记保护级·····,,···············,·············,············,············,,·············,············,·,··⋯75.3.1自主访问控制······································,,······················..····,⋯⋯,..······........⋯⋯75.3.2强制访问控制·,··,,,···,

5、4‘1·。。4········,,,,,·······,········一,,······..·⋯⋯,,.,.75.3.3标记··················,,·····························,····························,························一75.3.4身份鉴别··························,·····························,·····································

6、···..⋯⋯75.3.5客体重用·················,·············,·········································....···········,..···...⋯⋯85.3.6审计················,····················,·······,····················,,·····,····························,·⋯⋯85.3.7数据完整性·······,···,··············,···

7、··‘·······,···············,········,,二,,..·············.···一,,,..⋯95.3.8数据传输··············,···························,····························,,,,......··········....⋯⋯,9S.3.9密码支持···············,···································································‘···

8、········⋯⋯95.3.10资源利用··‘························,······················································

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。