当前位置:网站首页>What does security capability mean? What are the protection capabilities of different levels of ISO?
What does security capability mean? What are the protection capabilities of different levels of ISO?
2022-07-07 01:23:00 【Xingyun housekeeper】
At present, China's classified protection is divided into five levels , Different levels of security protection requirements are determined for different levels . Now let's talk about what security protection capability means ? What are the protection capabilities of different levels of ISO ?
What does security capability mean ?
《 Information security technology basic requirements for network security level protection 》 Security protection capability is defined as the ability to resist threats 、 The extent to which safety incidents are found and the previous state can be restored after damage .
What are the protection capabilities of different levels of ISO ?
The basic safety protection capabilities of objects protected at different levels are as follows :
1、 Level 1 security protection capability : It should be able to protect against... From individuals 、 Malicious attacks by threat sources with few resources 、 Ordinary natural disasters , And the damage to key resources caused by other threats of considerable harm , After their own damage , It can restore some functions .
2、 Second level security protection capability : It should be able to protect the system from small external organizations 、 Threat sources with a small amount of resources launch malicious attacks , General natural disasters 、 And other important resource damage caused by threats with a considerable degree of harm , After the system is damaged , It can restore some functions within a period of time .
3、 Level 3 security protection capability : It shall be able to protect the system from external organized groups under a unified security policy 、 Threat sources with rich resources launch malicious attacks 、 More serious natural disasters 、 And other major resource damage caused by threats with a considerable degree of harm , Be able to find security vulnerabilities and security time , After the system is damaged , It can recover most functions quickly .
4、 Level 4 security protection capability : It should be able to protect against... From the national level under the unified security policy 、 Of hostile organizations 、 Malicious attacks launched by threat sources with rich resources 、 Serious natural disasters , And the damage to resources caused by other threats of considerable harm , Be able to find out in time 、 Detect security events that detect attacks , After their own damage , Able to quickly restore all functions .
边栏推荐
- from . cv2 import * ImportError: libGL. so. 1: cannot open shared object file: No such file or direc
- 如何管理分布式团队?
- 405 method not allowed appears when the third party jumps to the website
- gnet: 一个轻量级且高性能的 Go 网络框架 使用笔记
- C # method of calculating lunar calendar date 2022
- Taro 小程序开启wxml代码压缩
- THREE. AxesHelper is not a constructor
- MySQL script batch queries all tables containing specified field types in the database
- Can the system hibernation file be deleted? How to delete the system hibernation file
- 斗地主游戏的案例开发
猜你喜欢
Make Jar, Not War
Segmenttree
Let's see through the network i/o model from beginning to end
The MySQL database in Alibaba cloud was attacked, and finally the data was found
让我们,从头到尾,通透网络I/O模型
[signal and system]
[100 cases of JVM tuning practice] 05 - Method area tuning practice (Part 2)
Installation of gazebo & connection with ROS
2022 Google CTF SEGFAULT LABYRINTH wp
Wood extraction in Halcon
随机推荐
NEON优化:关于交叉存取与反向交叉存取
boot - prometheus-push gateway 使用
THREE. AxesHelper is not a constructor
让我们,从头到尾,通透网络I/O模型
Informatics Olympiad YBT 1171: factors of large integers | 1.6 13: factors of large integers
「笔记」折半搜索(Meet in the Middle)
系统休眠文件可以删除吗 系统休眠文件怎么删除
Oracle:CDB限制PDB资源实战
【芯片方案设计】脉搏血氧仪
ClickHouse字段分组聚合、按照任意时间段粒度查询SQL
Eventbus source code analysis
How to manage distributed teams?
UI控件Telerik UI for WinForms新主题——VS2022启发式主题
负载均衡性能参数如何测评?
Taro2.* applet configuration sharing wechat circle of friends
736. Lisp 语法解析 : DFS 模拟题
阿里云中mysql数据库被攻击了,最终数据找回来了
ARM裸板调试之JTAG调试体验
Make Jar, Not War
golang中的atomic,以及CAS操作