Standard Code | Standard Title | Standard Class | Order |
---|---|---|---|
GB/T 20274.1-2023 |
Information security techniques - Information system security assurance assessment framework - Part 1: Introduction and general model {译} 信息安全技术 信息系统安全保障评估框架 第1部分:简介和一般模型 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 17902.1-2023 |
Information technology - Security techniques - Digital signatures with appendices - Part 1: Overview {译} 信息技术 安全技术 带附录的数字签名 第1部分:概述 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 25069-2022 |
Information security techniques—Terminology 信息安全技术 术语 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 25068.3-2022 |
Information technology Security techniques Network security Part 3: Threats, design techniques and controls for network access scenarios {译} 信息技术 安全技术 网络安全 第3部分:面向网络接入场景的威胁、设计技术和控制 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 25068.5-2021 |
Information technology—Security techniques—Network security—Part 5: Securing communications across networks using virtual private networks 信息技术 安全技术 网络安全 第5部分:使用虚拟专用网的跨网通信安全保护 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 17901.3-2021 |
Information technology—Security techniques—Key management—Part 3: Mechanisms using asymmetric techniques 信息技术 安全技术 密钥管理 第3部分:采用非对称技术的机制 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 17903.2-2021 |
Information technology—Security techniques—Non-repudiation—Part 2:Mechanisms using symmetric techniques 信息技术 安全技术 抗抵赖 第2部分:采用对称技术的机制 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 38647.2-2020 |
Information technology—Security techniques—Anonymous digital signatures—Part 2: Mechanisms using a group public key 信息技术 安全技术 匿名数字签名 第2部分:采用群组公钥的机制 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 34953.4-2020 |
Information technology—Security techniques—Anonymous entity authentication—Part 4: Mechanisms based on weak secrets 信息技术 安全技术 匿名实体鉴别 第4部分:基于弱秘密的机制 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 30284-2020 |
Information security techniques-Security technical requirements for operating system on smart mobile terminal
信息安全技术 移动通信智能终端操作系统安全技术要求 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 28454-2020 |
Information technology-Security techniques-Selection, deployment and operation of intrusion detection and prevention systems(IDPS) 信息技术 安全技术 入侵检测和防御系统(IDPS)的选择、部署和操作 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 25067-2020 |
Information technology—Security techniques—Requirements for bodies providing audit and certification of information security management systems 信息技术 安全技术 信息安全管理体系审核和认证机构要求 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 38631-2020 |
Information technology—Security techniques—Sector-specific application of GB/T 22080—Requirements 信息技术 安全技术 GB/T 22080具体行业应用 要求 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 17901.1-2020 |
Information technology--Security techniques--Key management--Part 1: Framework 信息技术 安全技术 密钥管理 第1部分:框架 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 20985.2-2020 |
Information technology—Security techniques—Information security incident management—Part 2: Guidelines to plan and prepare for incident response 信息技术 安全技术 信息安全事件管理 第2部分:事件响应规划和准备指南 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 15852.1-2020 |
Information technology—Security techniques—Message authentication codes—Part 1: Mechanisms using a block cipher 信息技术 安全技术 消息鉴别码 第1部分:采用分组密码的机制 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 28450-2020 |
Information technology—Security techniques—Guidelines for information security management systems auditing 信息技术 安全技术 信息安全管理体系审核指南 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 25068.2-2020 |
Information technology—Security techniques—Network security—Part 2: Guidelines for the design and implementation of network security 信息技术 安全技术 网络安全 第2部分:网络安全设计和实现指南 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 25068.1-2020 |
Information technology—Security techniques—Network security—Part 1:Overview and concepts 信息技术 安全技术 网络安全 第1部分:综述和概念 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 37939-2019 |
Information security technology—Security techniques requirement for network storage 信息安全技术 网络存储安全技术要求 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 15852.3-2019 |
Information technology—Security techniques—Message authentication codes (MACs)—Part 3: Mechanisms using a universal hash-function 信息技术 安全技术 消息鉴别码 第3部分:采用泛杂凑函数的机制 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 37046-2018 |
Information security techniques —Assessment criteria for disaster recovery service capability 信息安全技术-灾难恢复服务能力评估准则 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 37002-2018 |
Information security technology-Security techniques requirement for electronic mail system 信息安全技术-电子邮件系统安全技术要求 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 15851.3-2018 |
Information technology—Security techniques—Digital signature schemes giving message recovery—Part 3:Discrete logarithm based mechanisms 信息技术-安全技术-带消息恢复的数字签名方案-第3部分:基于离散对数的机制 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 36624-2018 |
Information technology—Security techniques—Authenticated encryption 信息技术 安全技术 可鉴别的加密机制 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 15843.6-2018 |
Information technology—Security techniques—Entity authentication—Part 6: Mechanisms using manual data transfer 信息技术 安全技术 实体鉴别 第6部分:采用人工数据传递的机制 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 34953.2-2018 |
Information technology-Security techniques—Anonymous entity authentication-Part 2: Mechanisms based on signatures using a group public key 信息技术 安全技术 匿名实体鉴别 第2部分:基于群组公钥签名的机制 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 36629.2-2018 |
Information security technology—Security techniques requirement for citizen cyber electronic identity—Part 2:Security technique requirements of carrier 信息安全技术 公民网络电子身份标识安全技术要求 第2部分:载体安全技术要求 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 36651-2018 |
Information security techniques—Biometric authentication protocol framework based on trusted environment 信息安全技术 基于可信环境的生物特征识别身份鉴别协议框架 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 34953.1-2017 |
Information technology—Security techniques—Anonymous entity authentication—Part 1: General 信息技术 安全技术 匿名实体鉴别 第1部分:总则 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 29246-2017 |
Information technology—Security techniques—Information security management systems—Overview and vocabulary 信息技术 安全技术 信息安全管理体系 概述和词汇 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 15843.1-2017 |
Information technology—Security techniques—Entity authentication—Part 1: General 信息技术 安全技术 实体鉴别 第1部分:总则 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 15843.2-2017 |
Information technology—Security techniques—Entity authentication—Part 2: Mechanisms using symmetric encipherment algorithms 信息技术 安全技术 实体鉴别 第2部分:采用对称加密算法的机制 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 20985.1-2017 |
Information technology - Security techniques - Information security incident management - Part 1: Principles of incident management 信息技术 安全技术 信息安全事件管理 第1部分:事件管理原理 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 35283-2017 |
Information security techniques—Specification for the structure of desktop core configuration baseline 信息安全技术 计算机终端核心配置基线结构规范 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 25067-2016 |
Information technology—Security techniques—Requirements for bodies providing audit and certification of information security management systems 信息技术 安全技术 信息安全管理体系审核和认证机构要求 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 20276-2016 |
Information security techniques—Security technical requirements for IC card chip with CPU 信息安全技术 具有中央处理器的IC卡嵌入式软件安全技术要求 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 32920-2016 |
Information technology—Security techniques—Information security management for inter-sector and inter-organizational communications 信息技术 安全技术 行业间和组织间通信的信息安全管理 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 22080-2016 |
Information technolog—Securitytechniques—Information security management systems—Requirements 信息技术 安全技术 信息安全管理体系 要求 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 32923-2016 |
Information technology—Security techniques—Governance of information security 信息技术 安全技术 信息安全治理 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 22081-2016 |
Information Technology—Security Techniques—Code ofpractice for information security controls 信息技术 安全技术 信息安全控制实践指南 |
China National Standards Information security techniques |
![]() English PDF |
GB/Z 32916-2016 |
Information technology—Security techniques—Guidelines for auditors on information security controls 信息技术 安全技术 信息安全控制措施审核员指南 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 22186-2016 |
Information security techniques—Security technical requirements for IC card chip with CPU 信息安全技术 具有中央处理器的IC卡芯片安全技术要求 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 32905-2016 |
Information security techniques—SM3 crytographic hash algorithm 信息安全技术 SM3密码杂凑算法 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 15843.3-2016 |
Information technology—Security techniques—Entity authentication—Part 3: Mechanisms using digital signature techniques 信息技术 安全技术 实体鉴别 第3部分:采用数字签名技术的机制 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 31722-2015 |
Information technology—Security techniques—Information security risk management 信息技术 安全技术 信息安全风险管理 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 31508-2015 |
Information security techniques—Public key infrastructure—Digital certificate policies classification and grading specification 信息安全技术 公钥基础设施 数字证书策略分类分级规范 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 31497-2015 |
Information technology—Security techniques—Information security management—Measurement 信息技术 安全技术 信息安全管理 测量 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 31496-2015 |
Information technology—Security techniques—Information security management system implementation guidance 信息技术 安全技术 信息安全管理体系实施指南 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 18336.3-2015 |
Information technology—Security techniques—Evaluation criteria for IT security—Part 3: Security assurance components 信息技术 安全技术 信息技术安全评估准则 第3部分:安全保障组件 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 18336.2-2015 |
Information technology—Security techniques—Evaluation criteria for IT security—Part 2: Security functional components 信息技术 安全技术 信息技术安全评估准则 第2部分:安全功能组件 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 18336.1-2015 |
Information technology—Security techniques—Evaluation criteria for IT security—Part 1: Introduction and general model 信息技术 安全技术 信息技术安全评估准则 第1部分:简介和一般模型 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 30282-2013 |
Information security technology—Techniques requirements and testing and evaluation approaches for Anti-Spam product 信息安全技术 反垃圾邮件产品技术要求和测试评价方法 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 30274-2013 |
Information security techniques—Public Key Infrastructure―Specification of testing on application interfaces of electronic signature card 信息安全技术 公钥基础设施 电子签名卡应用接口测试规范 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 29829-2013 |
Information security techniques - Functionality and interface specification of cryptographic support platform for trusted computing 信息安全技术 可信计算密码支撑平台功能与接口规范 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 29767-2013 |
Information security techniques - Public key infrastructure - Bridge Certification Authority leveled certificate specification 信息安全技术 公钥基础设施 桥CA体系证书分级规范 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 29246-2012 |
Information technology - Security techniques - Information security management systems - Overview and vocabulary 信息技术 安全技术 信息安全管理体系 概述和词汇 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 29245-2012 |
Information security techniques - Basic requirements of information security for national department 信息安全技术 政府部门信息安全管理基本要求 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 15852.2-2012 |
Information technology - Security techniques - Message Authentication Codes(MACs) - Part 2:Mechanisms using a dedicated hash-function 信息技术 安全技术 消息鉴别码 第2部分:采用专用杂凑函数的机制 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 28454-2012 |
Information technology - Security techniques - Selection, deployment and operations of intrusion detection systems 信息技术 安全技术 入侵检测系统的选择、部署和操作 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 25068.2-2012 |
Information technology - Security techniques - IT network security - Part 2: Network security architecture 信息技术 安全技术 IT网络安全 第2部分:网络安全体系结构 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 25068.1-2012 |
Information technology - Security techniques - IT network security - Part 1: Network security management 信息技术 安全技术 IT网络安全 第1部分:网络安全管理 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 25068.5-2010 |
Information technology - Security techniques - IT network security - Part 5: Securing communications across networks using virtual private networks 信息技术 安全技术 IT网络安全 第5部分:使用虚拟专用网的跨网通信安全保护 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 25068.4-2010 |
Information technology - Security techniques - IT network security - Part 4: Securing remote access 信息技术 安全技术 IT网络安全 第4部分:远程接入的安全保护 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 25068.3-2010 |
Information technology - Security techniques - IT network security - Part 3: Securing communications between networks using security gateways 信息技术 安全技术 IT网络安全 第3部分:使用安全网关的网间通信安全保护 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 25067-2010 |
Information technology - Security techniques - Requirements for bodies providing audit and certification of information security management systems 信息技术 安全技术 信息安全管理体系审核认证机构的要求 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 25060-2010 |
Information security techniques - Public key infrastructure - Interface specification of X.509 digital certificates application 信息安全技术 公钥基础设施 X.509数字证书应用接口规范 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 25057-2010 |
Information security techniques - Public key infrastructure - Specification of application interface of electronic signature card 信息安全技术 公钥基础设施 电子签名卡应用接口基本要求 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 25056-2010 |
Information security techniques - Specifications of cryptograph and related security technology for certificate authentication system 信息安全技术 证书认证系统密码及其相关安全技术规范 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 25055-2010 |
Information security techniques - Public key infrastructure security supporting platform framework 信息安全技术 公钥基础设施安全支撑平台技术框架 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 22186-2008 |
Information security techniques Security technical requirements for IC card chip with CPU(EAL4+) 信息安全技术 具有中央处理器的集成电路(IC)卡芯片安全技术要求(评估保证级4增强级) |
China National Standards Information security techniques |
![]() English PDF |
GB/T 17903.3-2008 |
Information technology - Security techniques - Non-repudiation - Part 3: Mechanisms using asymmetric techniques 信息技术 安全技术 抗抵赖 第3部分: 采用非对称技术的机制 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 15852.1-2008 |
Information technology - Security techniques - Message Authentication Codes(MACs) - Part 1: Mechanisms using a block cipher 信息技术 安全技术 消息鉴别码 第1部分:采用分组密码的机制 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 17964-2008 |
Information technology - Security Techniques - Modes of operation for a block cipher 信息安全技术 分组密码算法的工作模式 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 17903.2-2008 |
Information technology - Security techniques - Non-repudiation - Part 2: Mechanisms using symmetric techniques 信息技术 安全技术 抗抵赖 第2部分: 采用对称技术的机制 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 17903.1-2008 |
Information technilogy - Security techniques - Non-repudiation - Part 1: General 信息技术 安全技术 抗抵赖 第1部分: 概述 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 22081-2008 |
Information technology - Security techniques - Code of practice for information security management 信息技术 安全技术 信息安全管理实用规则 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 22080-2008 |
Information technology - Security techniques - Information security management systems - Requirements 信息技术 安全技术 信息安全管理体系 要求 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 15843.4-2008 |
Information technology - Security techniques - Entity authentication - Part 4:Mechanisms using a cryptographic check function 信息技术 安全技术 实体鉴别 第4部分: 采用密码校验函数的机制 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 15843.3-2008 |
Information technology - Security techniques - Entity authentication - Part 3:Mechanisms using digital signature techniques 信息技术 安全技术 实体鉴别 第3部分: 采用数字签名技术的机制 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 15843.2-2008 |
Information technology - Security techniques - Entity authentication - Part 2:Mechanisms using symmetric encipherment algorithm 信息技术 安全技术 实体鉴别 第2部分: 采用对称加密算法的机制 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 15843.1-2008 |
Information technology - Security techniques - Entity authentication - Part 1: General 信息技术 安全技术 实体鉴别 第1部分: 概述 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 21050-2007 |
Information security techniques - Security requirements for network switch (EAL3) 信息安全技术 网络交换机安全技术要求(评估保证级3) |
China National Standards Information security techniques |
![]() English PDF |
GB/T 21054-2007 |
Information security techniques - Public key infrastructure - Evaluation criteria for security classification protection of PKI system 信息安全技术 公钥基础设施 PKI系统安全等级保护评估准则 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 21053-2007 |
Information security techniques - Public key infrastructure - Technology requirement for security classification protection of PKI system 信息安全技术 公钥基础设施 PKI系统安全等级保护技术要求 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 21028-2007 |
Information security technology - Security techniques requirement for server 信息安全技术 服务器安全技术要求 |
China National Standards Information security techniques |
![]() English PDF |
GB/Z 20985-2007 |
Information technology - Security techniques -Information security incident management guide 信息技术 安全技术 信息安全事件管理指南 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 20273-2006 |
Information security technology Security techniques requirement for database management system 信息安全技术 数据库管理系统安全技术要求 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 20272-2006 |
Information security technology Security techniques requirement for operating system 信息安全技术 操作系统安全技术要求 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 20271-2006 |
Information security technology Common security techniques requirement for information system 信息安全技术 信息系统通用安全技术要求 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 20270-2006 |
Information security technology Basis security techniques requirement for network 信息安全技术 网络基础安全技术要求 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 19713-2005 |
Information technology-Security techniques-Public key in frastructure-Online certificate status protocol 信息技术 安全技术 公钥基础设施 在线证书状态协议 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 17902.2-2005 |
Information technology-Security techniques-Digital signatures with appendix-Part2:Identity-based mechanisms 信息技术 安全技术 带附录的数字签名 第2部分:基于身份的机制 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 15843.5-2005 |
Information technology-Security techniques-Entity authentication-Part 5:Mechanisms using zero knowledge techniques 信息技术 安全技术 实体鉴别 第5部分:使用零知识技术的机制 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 18238.3-2002 |
Information technology--Security techniques--Hash-functions--Part 3:Dedicated hash-functions 信息技术 安全技术 散列函数 第3部分:专用散列函数 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 18238.2-2002 |
Information technology--Security techniques--Hash-functions--Part 2:Hash-functions using an n-bit block cipher 信息技术 安全技术 散列函数 第2部分:采用n位块密码的散列函数 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 18238.1-2000 |
Information technology--Security techniques--Hash-function--Part 1:General 信息技术 安全技术 散列函数 第1部分:概述 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 17902.1-1999 |
Information technology--Security techniques--Digital signature with appendix--Part 1:General 信息技术 安全技术 带附录的数字签名 第1部分:概述 |
China National Standards Information security techniques |
![]() English PDF |
GB/T 17901.1-1999 |
Information technology--Security techniques--Key management--Part 1:Framework 信息技术 安全技术 密钥管理 第1部分:框架 |
China National Standards Information security techniques |
![]() English PDF |
GB 15851-1995 |
Information technology--Security techniques--Digital signature scheme giving message recovery 信息技术 安全技术 带消息恢复的数字签名方案 |
China National Standards Information security techniques |
![]() English PDF |
Find out:100Items | To Page of: First -Previous-Next -Last | 1 |