当前位置:网站首页>What does security capability mean? What are the protection capabilities of different levels of ISO?
What does security capability mean? What are the protection capabilities of different levels of ISO?
2022-07-07 01:23:00 【Xingyun housekeeper】
At present, China's classified protection is divided into five levels , Different levels of security protection requirements are determined for different levels . Now let's talk about what security protection capability means ? What are the protection capabilities of different levels of ISO ?
What does security capability mean ?
《 Information security technology basic requirements for network security level protection 》 Security protection capability is defined as the ability to resist threats 、 The extent to which safety incidents are found and the previous state can be restored after damage .
What are the protection capabilities of different levels of ISO ?
The basic safety protection capabilities of objects protected at different levels are as follows :
1、 Level 1 security protection capability : It should be able to protect against... From individuals 、 Malicious attacks by threat sources with few resources 、 Ordinary natural disasters , And the damage to key resources caused by other threats of considerable harm , After their own damage , It can restore some functions .
2、 Second level security protection capability : It should be able to protect the system from small external organizations 、 Threat sources with a small amount of resources launch malicious attacks , General natural disasters 、 And other important resource damage caused by threats with a considerable degree of harm , After the system is damaged , It can restore some functions within a period of time .
3、 Level 3 security protection capability : It shall be able to protect the system from external organized groups under a unified security policy 、 Threat sources with rich resources launch malicious attacks 、 More serious natural disasters 、 And other major resource damage caused by threats with a considerable degree of harm , Be able to find security vulnerabilities and security time , After the system is damaged , It can recover most functions quickly .
4、 Level 4 security protection capability : It should be able to protect against... From the national level under the unified security policy 、 Of hostile organizations 、 Malicious attacks launched by threat sources with rich resources 、 Serious natural disasters , And the damage to resources caused by other threats of considerable harm , Be able to find out in time 、 Detect security events that detect attacks , After their own damage , Able to quickly restore all functions .
边栏推荐
- Taro applet enables wxml code compression
- 黑马笔记---创建不可变集合与Stream流
- Taro2.* applet configuration sharing wechat circle of friends
- C语言实例_3
- LLDP兼容CDP功能配置
- 系统休眠文件可以删除吗 系统休眠文件怎么删除
- Niuke cold training camp 6B (Freund has no green name level)
- Send template message via wechat official account
- NEON优化:性能优化经验总结
- UI控件Telerik UI for WinForms新主题——VS2022启发式主题
猜你喜欢

Can the system hibernation file be deleted? How to delete the system hibernation file

Segmenttree

Dark horse notes - exception handling

字节P7专业级讲解:接口测试常用工具及测试方法,福利文

golang中的Mutex原理解析
![[signal and system]](/img/aa/a65d6da1d1d9410254ca7b775e24a6.png)
[signal and system]

Niuke cold training camp 6B (Freund has no green name level)

云呐-工单管理制度及流程,工单管理规范

Js逆向——捅了【马蜂窝】的ob混淆与加速乐

HMM notes
随机推荐
界面控件DevExpress WinForms皮肤编辑器的这个补丁,你了解了吗?
Gnet: notes on the use of a lightweight and high-performance go network framework
剑指 Offer II 035. 最小时间差-快速排序加数据转换
资产安全问题或制约加密行业发展 风控+合规成为平台破局关键
Meet in the middle
如何管理分布式团队?
gnet: 一个轻量级且高性能的 Go 网络框架 使用笔记
Supersocket 1.6 creates a simple socket server with message length in the header
Body mass index program, entry to write dead applet project
从底层结构开始学习FPGA----FIFO IP的定制与测试
自旋与sleep的区别
Spark TPCDS Data Gen
Maidong Internet won the bid of Beijing life insurance to boost customers' brand value
Come on, don't spread it out. Fashion cloud secretly takes you to collect "cloud" wool, and then secretly builds a personal website to be the king of scrolls, hehe
The MySQL database in Alibaba cloud was attacked, and finally the data was found
Neon Optimization: an optimization case of log10 function
C语言实例_5
Neon Optimization: About Cross access and reverse cross access
C语言实例_2
Implementation principle of waitgroup in golang