欢迎来到天天文库
浏览记录
ID:52003148
大小:928.42 KB
页数:35页
时间:2020-03-20
《DB32∕T 3421-2018 基础地理信息系统安全风险评估规范.pdf》由会员上传分享,免费在线阅读,更多相关内容在行业资料-天天文库。
1、ICS07.040A75备案号:60257-2018DB32江苏省地方标准DB32/T3421—2018基础地理信息系统安全风险评估规范Riskassessmentspecificationforfundamentalgeographicinformationsystems2018-06-25发布2018-07-10实施江苏质量技术监督局发布DB32/T3421—2018目次前言..............................................................
2、..................II引言...............................................................................III1范围...............................................................................12规范性引用文件..........................................................
3、...........13术语、定义和缩略语.................................................................14风险评估的原则.....................................................................25风险评估的流程与评估周期...........................................................25.1风险评估流程.....
4、..............................................................25.2风险评估周期...................................................................36风险评估形式与方法.................................................................46.1风险评估形式............................
5、.......................................46.2风险评估方法...................................................................57风险评估准备.......................................................................57.1基本要求..................................................
6、.....................57.2确定评估目标...................................................................57.3确定评估范围...................................................................67.4组建评估团队...................................................................6
7、7.5组织系统调研...................................................................67.6确定评估依据...................................................................67.7制定评估方案...................................................................67.8召开启动会议.............
8、......................................................78风险评估实施.......................................................................78.1资产识别.......................................................................78.2威胁识别.........
此文档下载收益归作者所有