-
内容大纲
本书介绍了中国网络安全分类保护系统(CCPS),涵盖了其发展,《中华人民共和国网络安全法》的解释,基本标准以及网络安全系统分类级别确定、注册、开发和改进等实践程序、评估、监督和检查。
本书分析了中国网络安全保护的实施和实践,并对现有的网络安全相关法律,法规和标准进行了解释。本书的目的是为了满足包括“一带一路”沿线企业在内的外国组织的培训和实施需求,以建立符合中国网络安全分类保护系统要求的网络安全保护。 -
作者介绍
-
目录
Part Ⅰ Interpretation of Cybersecurity Classified ProtectionSystem of China
Chapter1 Development of China Cybersecurity Classified Protection System
1.1 Establishment of Computer Information Systems Security Protection System
1.2 Establishment of Information Security Classified Protection System
1.3 Establishment of Cybersecurity Classified Protection System
Chapter2 Interpretation of the Cybersecurity Law
2.1 Cybersecurity Obligations and Primary Tasks
2.2 Division of Responsibilities and Related Obligations
2.3 National Cybersecurity Classified Protection System
2.4 Basic Responsibilities and Obligations of Network Operators
2.5 Operation Security of Critical Information Infrastructure
2.6 Network Data and Information Security
2.7 Monitoring, Early Warning, and Emergency Response
2.8 Acts Prohibited and Legal Responsibility
Chapter3 Interpretation of Cybersecurity Classified Protection System of China
3.1 Policies on Cybersecurity Classified Protection
3.1.1 General Policy Documents
3.1.2 Policy Document of Classified Protection Specific Stages
3.2 Basic Concept of Cybersecurity Classified Protection
3.2.1 Legal Basis for Carrying Out Cybersecurity Classified Protection
3.2.2 Policy Basis for Carrying Out Cybersecurity Classified Protection
3.2.3 What is Cybersecurity Classified Protection
3.2.4 Division and Supervision of Security Protection Levels
3.2.5 Critical Information Infrastructure Protection
3.3 Main Contents of the Cybersecurity Classified Protection System
3.3.1 Organization Structure of Cybersecurity Classified Protection
3.3.2 Main Stages and Basic Requirements of Classified Protection
3.3.3 Security Management of Evaluation
3.3.4 Network Products and Security Service Requirements
3.3.5 Monitoring, Early Warning and Information Reporting
3.3.6 Data Security Protection
3.3.7 Emergency Disposal Requirements
3.3.8 Evaluation Requirements
3.3.9 Risk Control of New Technology and New Application
3.3.10 Supervision and Administration of Cybersecurity Classified Protection Practices
Chapter4 Interpretation of Cybersecurity Classified Protection Standards of China
4.1 Cybersecurity Classified Protection Standards Framework
4.2 Relationship between Relevant Standards and Different Stages of Classified Protection
4.2.1 Basic Standards
4.2.2 Classification
4.2.3 Security Requirement
5.1 Classification of Security Protection Levels
5.1.1 Principle of Classification
5.1.2 Security Protection Levels of Network
5.1.3 Classification Factors of Cybersecurity Protection Level
5.1.4 Protection and Supervision of the Five Levels
5.2 Procedures of Classification
5.2.1 Determine the Classification Object
5.2.2 Determine the Security Protection Level of Network
5.2.3 Expert Reviews of Cybersecurity Protection Level
5.2.4 Examination of Cybersecurity Protection Level
5.2.5 Public Security Authorities Examine the Security Protection Level of Network
5.3 How to Determine the Security Protection Level of Network
5.3.1 How to Understand the Five Security Protection Levels of Network
5.3.2 General Process of Network Classification
Chapter6 Registration of Cybersecurity Classified Protection
6.1 Registration and Acceptance
6.2 Public Security Authorities Accept Network Registration
6.3 Treatment for Inaccurate Level and Non-registration
6.4 Public Security Authorities’ Guidance on Network Classification and Registration
Chapter7 Development and Improvement of Cybersecurity Classified Protection
7.1 Objective and Content
7.1.1 Objective
7.1.2 Scope and Characteristics
7.1.3 Contents
7.1.4 Cybersecurity Protection Capability Objective
7.2 Methods and Processes
7.2.1 Methods
7.2.2 Processes
7.3 Security Management System Development
7.3.1 Implementing Cybersecurity Responsibility System
7.3.2 Cybersecurity Management Status Analysis
7.3.3 Formulating Security Management Strategy and System
7.3.4 Conducting Security Management Measures
7.3.5 Security Self-Inspection and Adjustment
7.4 Security Technology Measures Development
7.4.1 Security Protection Technology Status Analysis of Network
7.4.2 Designing of Cybersecurity Technology Development and Improvement Plan
7.4.3 Implementation and Management of Security Development and Improvement Engineering
7.4.4 Elements of Cybersecurity Development and Improvement Plan
7.5 Selection and Use of Information Security Products
7.5.1 Selecting the Information Security Products Licensed for Sale
7.5.2 Multilevel Testing and Use of Products
8.1.3 When Should We Carry Out Level Evaluation
8.1.4 Business Scope of Level Evaluation Organizations
8.1.5 Standards of Level Evaluation
8.1.6 Development of Level Evaluation Business
8.1.7 Notes on the Application of Level Evaluation Standards
8.2 Management and Supervision of Level Evaluation Organizations and Personnel
8.2.1 Why Need to Develop the Level Evaluation System
8.2.2 Management of Evaluation Organizations and Personnel
8.2.3 Business Scope and Work Requirements of Evaluation Organizations
8.3 Risk Control of Level Evaluation
8.3.1 Existing Risks
8.3.2 Risk Aversion
8.4 Evaluation Reports
Chapter9 Supervision and Inspection of Cybersecurity Classified Protection
9.1 Regular Self-Inspection and Supervision
9.1.1 Regular Self-inspection of Registration Organizations
9.1.2 Supervision and Inspection of Industry Competent Departments
9.2 Supervision and Inspection of Public Security Authorities
9.2.1 Principles and Methods
9.2.2 Main Contents of Inspection
9.2.3 Inspection and Improvement Requirements
9.2.4 Inspection Requirements
9.2.5 Incidents Investigation
9.3 Supervision and Management of Network Service Organizations
Part Ⅲ Appendices
AppendixA Cybersecurity Law of the People’s Republic of China
AppendixB The Cryptography Law of the People’s Republic of China
AppendixC Regulations of the People’s Republic of China on the Protection of Computer InformationSystem Security
AppendixD Administration Measures for Information Security Classified Protection
AppendixE Regulations for the Cybersecurity Classified Protection
AppendixF Specifications on Information Security Classified Protection Inspection of PublicSecurity Authorities (Trial)
AppendixG Administration Measures for Cybersecurity Classified Protection EvaluationOrganizations
AppendixH Interpretation of Classification Guide for Classified Protection of Cybersecurity (GB/T 22240-2020)
AppendixI Interpretation of Baseline for Classified Protection of Cybersecurity (GB/T22239-2019)
AppendixJ Interpretation of Technical Requirements of Security Design for ClassifiedProtection of Cybersecurity (GB/T 25070-2019)
AppendixK Interpretation of Evaluation Requirement for Classified Protection of Cybersecurity (GB/T 28448-2019)
Glossaryof Classified Protection Terms
同类热销排行榜
- C语言与程序设计教程(高等学校计算机类十二五规划教材)16
- 电机与拖动基础(教育部高等学校自动化专业教学指导分委员会规划工程应用型自动化专业系列教材)13.48
- 传感器与检测技术(第2版高职高专电子信息类系列教材)13.6
- ASP.NET项目开发实战(高职高专计算机项目任务驱动模式教材)15.2
- Access数据库实用教程(第2版十二五职业教育国家规划教材)14.72
- 信号与系统(第3版下普通高等教育九五国家级重点教材)15.08
- 电气控制与PLC(普通高等教育十二五电气信息类规划教材)17.2
- 数字电子技术基础(第2版)17.36
- VB程序设计及应用(第3版十二五职业教育国家规划教材)14.32
- Java Web从入门到精通(附光盘)/软件开发视频大讲堂27.92
推荐书目
-

孩子你慢慢来/人生三书 华人世界率性犀利的一枝笔,龙应台独家授权《孩子你慢慢来》20周年经典新版。她的《...
-

时间简史(插图版) 相对论、黑洞、弯曲空间……这些词给我们的感觉是艰深、晦涩、难以理解而且与我们的...
-

本质(精) 改革开放40年,恰如一部四部曲的年代大戏。技术突变、产品迭代、产业升级、资本对接...
[
