×÷ΪÖйúµÚÈý·½¼ì²âÓëÈÏÖ¤·þÎñµÄ¿ªÍØÕߺÍÁìÏÈÕߣ¬NG28ÄϹ¬28NGÏàÐÅÆ·ÅÆÁ¦Á¿¼ì²âΪȫÇò¿Í»§Ìṩһվʽ¼ìÑé¡¢²âÊÔ¡¢Ð£×¼¡¢ÈÏÖ¤¼°¼¼Êõ·þÎñ¡£
·þÎñÄÜÁ¦ÒÑÈ«ÃæÁýÕÖµ½·ÄÖ¯·þ×°¼°Ð¬°ü¡¢Ó¤Í¯Íæ¾ß¼°¼Ò¾ÓÉú»î¡¢µç×ÓµçÆ÷¡¢Ò½Ñ§½¡¿µ¡¢Ê³Æ·¼°Å©²úÎï……µÈÐÐÒµµÄ¹©Ó¦Á´ÉÏÏÂÓΡ£
È«Ãæ±£ÕÏÆ·ÖÊÓëÄþ¾²£¬Íƶ¯ºÏ¹æÓ봴У¬ÕÃÏÔÆ·ÅƾºÕùÁ¦£¬ÊµÏÖ¸ü¸ßÖÊÁ¿¡¢¸ü½¡¿µ¡¢¸üÄþ¾²¡¢¸üÂÌÉ«µÄ¿ÉÁ¬ÐøÉú³¤¡£
Ê×Ò³ > ÎÒÃǵķþÎñ > Ò½Ò©¼°Ò½Ñ§·þÎñ > Ò½ÁÆÆ÷е¼ì²â > ·þÎñÏêÇé
2015ÄêÒÔÀ´£¬ÎÒ¹úÒ©¼à²¿ÃÅÏȺóÐû²¼ÁË¡¶Ò½ÁÆÆ÷еÈí¼þ×¢²á¼¼ÊõÉó²éÖ¸µ¼ÔÔò¡·¡¶Ò½ÁÆÆ÷еÍøÂçÄþ¾²×¢²á¼¼ÊõÉó²éÖ¸µ¼ÔÔò¡·¡¶Òƶ¯Ò½ÁÆÆ÷еע²á¼¼ÊõÉó²éÖ¸µ¼ÔÔò¡·µÈÖ¸µ¼ÔÔò£¬ÒÔ±£ÕÏÒ½ÁÆÆ÷еÈí¼þ²úÎïÄþ¾²ÐÔºÍÓÐЧÐÔ¡£NG28ÄϹ¬28NGÏàÐÅÆ·ÅÆÁ¦Á¿¼ì²âΪÄúÌṩҽÁÆÆ÷еÈí¼þ²âÆÀ£¬ÒÀ¾Ý¡¶Ò½ÁÆÆ÷еÈí¼þ×¢²á¼¼ÊõÉó²éÖ¸µ¼ÔÔò¡·GB/T25000.51´ÓÈí¼þ¹¤³Ì¼¼Êõ½Ç¶È¶ÔÈí¼þÖÊÁ¿ÆÀ¼Û½¨Á¢ÁËÄ£ÐÍ£¬´Ó¹¦Ð§ÐÔ¡¢ÐÔÄÜЧÂÊ¡¢¼æÈÝÐÔ¡¢Ò×ÓÃÐÔ¡¢¿É¿¿ÐÔ¡¢ÐÅÏ¢Äþ¾²ÐÔ¡¢Î¬»¤ÐÔ¡¢¿ÉÒÆÖ²ÐÔ¡¢¼°Óû§Îĵµ¼¯9¸ö·½Ãæ½øÐÐÈí¼þÖÊÁ¿ÆÀ¼Û¡£
µ±Ç°£¬ÎÒ¹úÒ½ÁÆÆ÷еÈí¼þÖÊÁ¿ÒªÇóµÄÖ÷ÒªÒÀ¾ÝÊÇ¡¶Ò½ÁÆÆ÷еÈí¼þ×¢²á¼¼ÊõÉó²éÖ¸µ¼ÔÔò¡·£¬¸ÃÖ¸µ¼ÔÔò¶ÔÈí¼þÖÊÁ¿ÒªÇóµÄ²Î¿¼³ß¶ÈΪGB/T25000.51¡£GB/T25000.51´ÓÈí¼þ¹¤³Ì¼¼Êõ½Ç¶È¶ÔÈí¼þÖÊÁ¿ÆÀ¼Û½¨Á¢ÁËÄ£ÐÍ£¬´Ó¹¦Ð§ÐÔ¡¢ÐÔÄÜЧÂÊ¡¢¼æÈÝÐÔ¡¢Ò×ÓÃÐÔ¡¢¿É¿¿ÐÔ¡¢ÐÅÏ¢Äþ¾²ÐÔ¡¢Î¬»¤ÐÔ¡¢¿ÉÒÆÖ²ÐÔ¡¢¼°Óû§Îĵµ¼¯9¸ö·½Ãæ½øÐÐÈí¼þÖÊÁ¿ÆÀ¼Û¡£
¡ñ Èí¼þ²âÆÀ·þÎñÖ÷Òª°üÂÞ£ºÍ¨ÓÃÓ¦ÓÃÈí¼þ²âÆÀ¡¢APPÄþ¾²¼ì²â¡¢ÐÅÏ¢Äþ¾²·þÎñÈý¸ö²âÆÀ·þÎñÆ«Ïò¡£
The software evaluation service includes general software evaluation, APP security test , information security.
¡ñ GB/T 25000.51-2016¡¶ÏµÍ³ÓëÈí¼þ¹¤³ÌϵͳÓëÈí¼þÖÊÁ¿ÒªÇóºÍÆÀ¼Û£¨SQuaRE£©µÚ51²¿ÃÅ£º¾ÍÐ÷¿ÉÓÃÈí¼þ²úÎRUSP£©µÄÖÊÁ¿ÒªÇóºÍ²âÊÔϸÔò¡· IEC/ISO25051
System and software engineering - System and software quality requirements and evaluation(SQuaRE)- part 51 requirements for quality of ready to use software software products( RUSP) and instructions for testing
¡ñ GB/T 25000.10-2016 ¡¶ÏµÍ³ÓëÈí¼þ¹¤³ÌϵͳÓëÈí¼þÖÊÁ¿ÒªÇóºÍÆÀ¼Û£¨SQuaRE£©µÚ10²¿ÃÅ£ºÏµÍ³ÓëÈí¼þÖÊÁ¿Ä£ÐÍ IEC/ISO25010
System and software engineering - System and software quality requirements and evaluation(SQuaRE)- part 10 System and software quality models
¡ñ ÍøÂçÄþ¾²ºÍ©¶´ÆÀ¹À
¡ñ YY/T1843-2022 Ò½ÓõçÆøϵͳ¼°Ò½ÁÆÆ÷еÈí¼þµÄÍøÂçÄþ¾²»ù±¾ÒªÇó
IEC/TR80001-2-2 Application of risk management for IT-networks incorporating medical devices — Part 2-2: Guidance for the communication of medical device security needs, risks and controls
´ø¶ÀÁ¢Èí¼þµÄÓÐÔ´Ò½ÁÆÆ÷еµÈ
ÍêÕûÄÜÕý³£ÊÂÇéµÄÑù»ú£¬ÆäËû¾ßÌåÏêÇéÇë×ÉѯNG28ÔÚÏß¿Í·þ¡£