市面仅有的全面解读中国网络安全等级保护标准体系及等级保护实施的读本 业内专家对中国网络安全等级保护制度的深阐释; 来自官方团队的中国网络安全等级保护标准体系全面解读; 切实指导中国网络安全等级保护落地实施的指南; 助力一带一路等国外组织和公司在中国做好信息安全合规,确保业务平顺
售 价:¥
纸质售价:¥86.80购买纸书
温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印
为你推荐
扉页
版权页
目录
Content Summary
Authors List
Foreword
PartⅠ Interpretation of Cybersecurity Classified Protection System of China
Chapter 1 Development of China Cybersecurity Classified Protection System
1.1 Establishment of Computer Information Systems Security Protection System
1.2 Establishment of Information Security Classified Protection System
1.3 Establishment of Cybersecurity Classified Protection System
Chapter 2 Interpretation of the Cybersecurity Law
2.1 Cybersecurity Obligations and Primary Tasks
2.2 Division of Responsibilities and Related Obligations
2.3 National Cybersecurity Classified Protection System
2.4 Basic Responsibilities and Obligations of Network Operators
2.5 Operation Security of Critical Information Infrastructure
2.6 Network Data and Information Security
2.7 Monitoring, Early Warning, and Emergency Response
2.8 Acts Prohibited and Legal Responsibility
Chapter 3 Interpretation of Cybersecurity Classified Protection System of China
3.1 Policies on Cybersecurity Classified Protection
3.2 Basic Concept of Cybersecurity Classified Protection
3.3 Main Contents of the Cybersecurity Classified Protection System
Chapter 4 Interpretation of Cybersecurity Classified Protection Standards of China
4.1 Cybersecurity Classified Protection Standards Framework
4.2 Relationship between Relevant Standards and Different Stages of Classified Protection
4.3 Issues Need Attentions for the Application of Relevant Standards
4.4 Brief Description of Main Standards on Cybersecurity Classified Protection
PartⅡ Implementation of Cybersecurity Classified Protection System of China
Chapter 5 Classification of Cybersecurity Classified Protection
5.1 Classification of Security Protection Levels
5.2 Procedures of Classification
5.3 How to Determine the Security Protection Level of Network
Chapter 6 Registration of Cybersecurity Classified Protection
6.1 Registration and Acceptance
6.2 Public Security Authorities Accept Network Registration
6.3 Treatment for Inaccurate Level and Non-registration
6.4 Public Security Authorities’ Guidance on Network Classification and Registration
Chapter 7 Development and Improvement of Cybersecurity Classified Protection
7.1 Objective and Content
7.2 Methods and Processes
7.3 Security Management System Development
7.4 Security Technology Measures Development
7.5 Selection and Use of Information Security Products
7.6 Selecting the Development Service Organization of Cybersecurity Classified Protection
Chapter 8 Level Evaluation of Cybersecurity Classified Protection
8.1 Overview of Level Evaluation
8.2 Management and Supervision of Level Evaluation Organizations and Personnel
8.3 Risk Control of Level Evaluation
8.4 Evaluation Reports
Chapter 9 Supervision and Inspection of Cybersecurity Classified Protection
9.1 Regular Self-Inspection and Supervision
9.2 Supervision and Inspection of Public Security Authorities
9.3 Supervision and Management of Network Service Providers
PartⅢ Appendices
Appendix A Cybersecurity Law of the People’s Republic of China
Appendix B The Cryptography Law of the People’s Republic of China
Appendix C Regulations of the People’s Republic of China on the Protection of Computer Information System Security
Appendix D Administration Measures for Information Security Classified Protection
Appendix E Regulations for the Cybersecurity Classified Protection
Appendix F Specifications on Information Security Classified Protection Inspection of Public Security Authorities (Trial)
Appendix G Administration Measures for Cybersecurity Classified Protection Evaluation Organizations
Appendix H Interpretation of Classification Guide for Classified Protection of Cybersecurity (GB/T 22240—2020)
Appendix I Interpretation of Baseline for Classified Protection of Cybersecurity (GB/T 22239—2019)
Appendix J Interpretation of Technical Requirements of Security Design for Classified Protection of Cybersecurity (GB/T 25070—2019)
Appendix K Interpretation of Evaluation Requirement for Classified Protection of Cybersecurity (GB/T 28448—2019)
Glossary of Classified Protection Terms
买过这本书的人还买过
读了这本书的人还在读
同类图书排行榜