当前位置:网站首页>Secret comment-----
Secret comment-----
2022-06-11 18:02:00 【The shark is starving】
Business code It refers to the password technology and password products used for encryption protection or security authentication of information that does not involve state secrets .
Commercial password security assessment ( Short for secret comment )
– Compliance
– correctness
– effectiveness
20191026《 The code law of the people's Republic of China 》
Cipher interpretation
- Specification promotes password application
- Administrative licensing system
- Password requirements
- Evaluate the review mechanism
- The service agency recognizes that
Breach of clause
Password law of the people's Republic of China Article 37 - Article 1
Real threats
- Passwords are not widely used
- Password application is not standardized
- Password application is not secure (MD5,SHA-1,RSA-512,DES
Three tier requirements
4. Legal needs
5. Waiting for insurance
6. System security requirements
Management organization
– State Password Administration
– Chinese cryptology society
– Institutions
Guidance document
- Information system password application evaluation requirements
- Information system password application evaluation process guide
- Guidelines for high risk determination of password application in information system
- Quantitative evaluation standard for security evaluation of commercial cryptographic applications
- Commercial password application security assessment report template
service content
System grading and filing
Field gap analysis
Safety construction rectification
Formal evaluation
Safety self inspection, supervision and inspection
Secret rating
4
Evaluation methods
GMT Basic requirements for password application of information system
- Physical and environmental security
- Network and communication security
- Device and computing security
- Application and data security
边栏推荐
- mariadb spider分片引擎初體驗
- Getting started with Wireshark
- Service learning notes 01 start method and life cycle
- 6-2 reverse output of multiple integers recursion
- vulhub
- Speed adjustment of tidb DDL
- Acwing game 40 [End]
- 合并K个升序链表---2022/02/26
- Spring 2021 daily question [week3 not finished]
- Comparison of mongoose in express, KOA and egg
猜你喜欢

Summary of clustering methods

Ffmpeg hardware codec NVIDIA GPU

如何学习和自学

Delete the penultimate node of the linked list ---2022/02/22

sqli-labs通关嘿嘿~

合并K个升序链表---2022/02/26

有效的括号---2022/02/23

Why is the UDP stream set to 1316 bytes

jsfinder,wafw00f安装,nmap配置(缺少msvcr120.dll文件)
![Winter vacation daily question (improvement group) [end of week 4]](/img/67/89b5164712d8c4eb319b9266dd4b91.jpg)
Winter vacation daily question (improvement group) [end of week 4]
随机推荐
Test basis: black box test
安装mariadb 10.5.7(tar包安装)
括号生成---2022/02/25
ArrayList collection, object array
Hash table, inheritance
spawn ./ gradlew EACCES at Process. ChildProcess._ handle. onexit
Dynamic: capturing network dynamics using dynamic graph representation learning
【MapReduce】一个完整MR程序案例教你如何用IDEA打包及运行
R语言寻找数据集缺失值位置
夜神安装apk,以及bp代理
[foundation of deep learning] learning of neural network (3)
Service learning notes 01 start method and life cycle
Service学习笔记01-启动方式与生命周期
mariadb spider分片引擎初體驗
聚类方法汇总
which is not functionally dependent on columns in GROUP BY clause; this is incompatible with sql_ mod
Service learning notes 03 front desk service practice
7-2 h0107. Pig-Latin
Intelligent overall legend, legend of wiring, security, radio conference, television, building, fire protection and electrical diagram [transferred from wechat official account weak current classroom]
Global and Chinese market of high frequency bipolar junction transistors 2022-2028: Research Report on technology, participants, trends, market size and share