Current location - Training Enrollment Network - Education and training - Catalogue of training materials for basic requirements of information security level protection
Catalogue of training materials for basic requirements of information security level protection
Chapter 1 Overview of basic requirements for level protection 1

1. 1 protection background and basic requirements of function 2

1. 1. 1 Basic content 2 of information system security level protection

1. 1.2 Main functions and features 3

1.2 Safety protection capability of different safety levels 4

1.2. 1 countermeasure capability 5

1.2.2 Elasticity 7

1.2.3 protection capability requirements 8

1.3 the idea of basic requirement 9

1.3. 1 gradual enhancement principle 10

1.3.2 The control points increase step by step 1 1.

1.3.3 requires gradual increase 12.

1.3.4 control intensity is enhanced step by step 13

Relationship between 1.4 and other standards 14

1.4. 1 standard room 14

1.4.2 technical standard 16

Chapter 2 Basic Requirements and Safety Model 26

2. Relationship between1and PPDRR model 26

2. 1. 1 PPDRR model introduction 26

2. 1.2 Relationship between basic requirements of level protection and PPDRR model 30

2.2 the relationship between basic requirements and IATF 3 1

Introduction to IATF 3 1

2.2.2 Relationship between Basic Requirements of Grade Protection and IATF 36

2.3 Relationship between Basic Requirements and CMM 37

Chapter III Basic Requirements of Safety Technology and Safety Management 43

3. 1 Basic requirements of frame structure 43

3.2 Basic requirements of safety technology 45

3.2. 1 Basic requirements for Class III safety technology 45

Tag description 47

3.2.3 Hierarchy Description of Technical Requirements 48

3.3 Management Requirements 55

3.3. 1 safety management system 55

Safety management organization 56

3.3.3 Personnel safety management 57

3.3.4 System Construction Management 58

3.3.5 System Operation and Maintenance Management 60

Chapter 4 Identification 62

4. 1 authentication mechanism 62

4. 1. 1 the concept of identification and authentication 62

4. 1.2 identification technology 65

4. 1.3 Security mechanism related to authentication 68

4. 1.4 CC marking and marking requirements 70

4.2 Basic requirements for authentication in host and application security 72

4.2. 1 Host authentication requirements 72

4.2.2 Identification requirements in application 75

4.3 Identification requirements for network equipment 76

4.3. 1 protection requirements for primary network equipment (G 1) 76

4.3.2 Protection Requirements for Network Equipment of Secondary Information System (G2) 77

4.3.3 Three-level network equipment protection (G3) 77

4.3.4 Four-level network equipment protection (G4) 77

Chapter 5 Autonomous Access Control 78

5. 1 General concept of access control 78

5. 1. 1 general principles of access control 82

5. 1.2 access control flow 87

5. 1.3 access control type 90

5. 1.4 Access control information 92

5. 1.5 access control model 95

5.2 discretionary access control 100

5.2. 1 protection bit mechanism 10 1

5.2.2 Access Control List Mechanism 102

5.2.3 Access Authority and Access Operation Authority 103

5.3 Independent Access Control Requirements 105

5.3. 1 access control requirements for primary and secondary hosts (S 1)(S2) 105.

5.3.2 Access Control Requirements for Level 1 and Level 2 Application Security (S 1)(S2) 106.

5.3.3 Network Access Control (G 1)(G2) 107

Chapter 6 Marking and Mandatory Access Control (MAC) 1 10

6. 1 mark 1 10

6. Functions and requirements of1.1tag 1 10

6. The marking requirement in1.2cc is 1 12.

6.2 Mandatory access control 1 16

6.2. Implementation method of1MAC mechanism 1 17

Measures to support MAC 1 18

6.3 Role-based Access Control (RBAC) 120

6. 3. 1 RBAC RBAC concept 12 1

6.3.2 RBAC 96 122

6.3.3 RBAC 97 model (administrative RBAC model) 124.

6.3.4 NIST RBAC recommended standard 124.

6.3.5 Characteristics of RBAC125

6.4 New Access Control 127

6. 4. 1 task-based access control (TBAC) 128

6.4.2 Object-based Access Control (OBAC) 129

6.5 Mandatory Access Control Requirements for Advanced Information Systems 130

6.5. 1 Mandatory access control requirements for the third and fourth levels of host and application security 130

6.5.2 Network access control 13 1

Chapter VII Safety Audit 134

7. 1 the concept of safety audit 134

7. 1. 1 definition 135

7. 1.2 audit purpose and basic requirements 136

7. 1.3 audit events 138

7.2 Implementation of Audit System 139

7.2. 1 General method of audit implementation 139

7.2.2 Implementing Audit in Host Environment 145

7.2.3 Audit in Distributed Environment 149

7.3 Audit information browsing 150

7.3. 1 audit information browsing technology 15 1

7.3.2 Harmless Treatment of Audit Information 152

7.4 Basic requirements of audit 153

7.4. 1 Audit requirements for hosts and applications 154

7.4.2 Network Security Audit 156

Chapter VIII Intrusion Prevention 158

8. 1 Overview of Invasion 158

Classification 8. 1. 1 attack 159

8. 1.2 attack steps 160

8. 1.3 Common means of hacker attack 162

Develop 8. 1.4 attack 5438+064

8.2 Defects of IPv4 Protocol and Attacks Caused by it 165

8.2. 1 Defects and possible attacks of network layer protocols 165

8.2.2 Transport layer security issues 172

8.2.3 Security Issues of High-level Protocol 177

8.3 Vulnerabilities of host system and application software 18 1

8.3. 1 introduction to system vulnerabilities 182

8.3.2 Examples of some vulnerabilities in the operating system 183

8.3.3 Examples of some vulnerabilities in the database 19 1

8.3.4 Vulnerability of application 192

8.4 Basic requirements of intrusion prevention 196

8.4. 1 network intrusion prevention 196

8.4.2 Basic requirements for host intrusion protection 198

Chapter 9 Prevention of Malicious Code 199

9. 1 introduction of malicious code 199

Computer virus 20 1

9. 1.2 Worm 205

9. 1.3 trap door 207

9. 1.4 Trojan horse 2 10

9. 1.5 Logic Bomb 2 13

9. 1.6 rogue software 2 14

9. 1.7 Botnet 2 15

9.2 Basic requirements for malicious code prevention 2 16

9.2. 1 Preventing malicious code in the network 2 16

9.2.2 Basic Requirements for Preventing Malicious Code of Host 2 17

Chapter 10 Data Protection 2 19

Protection of user data 220

10. 1. 1 privacy protection of user data 46438

Integrity protection of user data 229

10.2 TSF data protection 23 1

10.3 Basic requirements for data protection 233

10.3. 1 data confidentiality protection requirements 234

10.3.2 data integrity requirements

10.3.3 Significance and requirements of trusted path 238

10.4 Denying resistance 24 1

10. 4. 1 denial function 24 1

10.4.2 non-repudiation requirements 243

Chapter 1 1 Network Structure Security and Boundary Integrity 244

1 1. 1 network structure security 244

11.1.1security domain division 245

1 1. 1.2 subsystem partition 249

1 1. 1.3 Basic requirements for network structure security 256

1 1.2 network boundary integrity protection 258

1 1.2. 1 requirements for protection of boundary integrity.50000.000000000605

1 1.2.2 Introduction of boundary integrity checking methods and techniques 259

Chapter 12 Basic requirements for system service function protection 26 1

12. 1 Fault-tolerant backup and recovery technology 26 1

12. 1. 1 inspection technology principle 263

12.10.2 introduction of hardware fault-tolerant system 266

12.10.3 introduction of software fault-tolerant system 269

12. 1.4 data fault tolerance 270

12. 1.5 Trusted recovery 273

12. 1.6 Basic requirements for fault tolerance, backup and recovery 276

12.2 resource control 277

Basic requirements for controlling host resources 278

12.2.2 Basic requirements for resource control in application security 279

Chapter 13 Information Security Management System 28 1

13. 1 Overview of information security management system 282

13.2 principles of information security management system 283

13.3 information security management system standard 295

Chapter 14 Management Requirements 300

14. 1 safety management system 300

14. 1. 1 management system 30 1

14. 1.2 formula and version 302

14. 1.3 review and revision 303

14.2 safety management organization 304

14.2. 1 post setting 305

Staffing 306

Authorization and approval 307

Communication and cooperation

14.2.5 audit and inspection

14.3 personnel safety management 309

14.3. 1 employment 3 1 1

14.3.2 resigned personnel 3 1 1

14.3.3 personnel identification 3 12

Safety awareness education and training 3 13

External personnel access management 3 14

14.4 system construction management 3 15

14.4. 1 system classification 3 16

14.4.2 security scheme design 3 17

14.4.3 product procurement 3 18

14.4.4 Software developed by ourselves 3 18

14.4.5 outsourcing software development 3 19

14.4.6 project implementation

14.4.7 test acceptance

14.4.8 system delivery

14.4.9 system archiving 322

14.4. 10 rating 322

Security Service Provider Selection 323

14.5 system operation and maintenance management 323

Environmental management 325

14.5.2 asset management 326

Media management 327

14.5.4 equipment management 328

14.5.5 Monitoring Management and Safety Management Center 328

14.5.6 Network Security Management 329

14.5.7 system security management

14.5.8 malicious code management 33 1

Password management 33 1

Change management 332

14. 5. 1 1 backup and recovery management 333

Security event handling 333

Emergency plan management 334