In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-03-26 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
Detailed list of filing tasks for information system security level protection
Organize and lead the establishment of a leading group of information security level protection headed by the "top leader". Bring information security level protection into the information construction process, make special funds for information security, and synchronously implement information security level protection requirements in the links of demand analysis, project establishment, design, construction, acceptance, operation and maintenance. Pre-filing of matters for filing. Among them, the e-government system still needs to apply for pre-filing in the stage of demand analysis. Supplementary filing, level 3 or above
The system is completing the work of system construction, rectification and evaluation. Within 30 days after putting into operation, supplement the "Information system Security level Protection record form IV with related Materials" system topology and description of the system security organization structure and management system security protection facilities implementation plan or reconstruction implementation plan list and certification of safety products used in the system and certification, sales license system grade evaluation report on the examination and approval of the superior competent department for the record. If there is a change in the items contained in the Information system Security level Protection record form, the filing unit shall, within 30 days from the date of the change, re-fill in the Information system Security level Protection record form and report it to the public security network security department for the record. attachments that send changes but do not involve changes in the items in the form may directly submit attachments. Design and construction shall formulate security technical measures in accordance with the measures for hierarchical Protection of Information Security system and relevant standards for the design and construction of information security level protection measures. Safety management system report same level public security network security department filing security protection facility implementation plan report same level public security network security department filing evaluation work e-government system annual evaluation three-level system annual evaluation four-level system annual self-examination work below three-level system annual self-examination results report statistics public security organs record rectification work according to evaluation, The problems and hidden dangers found by the self-examination and the rectification measures found by the relevant departments shall take corresponding measures to effectively control risks before the completion of rectification and reform, and the security construction plan shall be reported to the public security network security department at the same level for the record.
Note: the Information system Security level Protection record form can be downloaded from the official website of the Ministry of Public Security at the prefectural and municipal level.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.