Information security technology—Guide of implementation for internet-basede-government information security—Part 1:General (English Version)
Version Comparison Dimensions | GB/Z 24294-2009 | GB/Z 24294.1-2018 |
---|---|---|
Model Framework | No complete reference model has been established | New PIDDE five-stage security reference model |
Technical System | Basic Technical Architecture | Reconstructed into 8 major technical subsystems |
Mobile Office | No special provisions | New mobile terminal security adaptation specification |
The PIDDE model proposed in the standard constitutes a closed-loop process for e-government security construction:
The standard-built layered protection system includes:
Implementation mode | Data centralized | Data distributed | Mobile office |
---|---|---|---|
Core features | Physical concentration + logical isolation | Hierarchical VPN tunnel interconnection | Wireless terminal security adaptation |
Applicable scenarios | Municipal data center | County and township decentralized deployment | Mobile government scenarios |
Four core principles emphasized by the standard:
Based on GB/T 20984 Establish a 6-stage assessment process:
GB/Z 24294.1-2018 Information security technology—Guide of implementation for internet-basede-government information security—Part 1:General has been changed from GB/Z 24294-2009 Information security technology.Guide of implementation for internet-based E-government inoformation security.
Copyright ©2007-2025 ANTPEDIA, All Rights Reserved