Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

Cyber security construction project for a wind power plant power monitoring system

The customer's power monitoring system network is facing many security threats, for example, most host computers are commercial computers of old operating systems (mainly running Win 7) and have not been patched. There are many problems such as weak passwords and high-risk open ports. Once hackers enter the power monitoring system, they can easily obtain the control authority of the devices, causing security risks such as illegal operation and virus release. It is necessary to deploy the devices capable of detecting asset vulnerabilities in industrial control sites in the power monitoring system to check for security defects or vulnerabilities in the system.

Background

The power industry is a key national information infrastructure. To ensure the security of the power monitoring system and prevent hackers and malicious codes from attacking and infringing on the power monitoring system, an electric power enterprise in Yunnan conducts security construction for its power monitoring system network. Protect the power monitoring system against security incidents such as system collapse or paralysis due to attacks. The construction plan of this project is made by referring to the Regulations on the Security Protection of Electric Power Monitoring System, Administrative Measures for the Information Security Classified Protection and relevant national regulations. It complies with the general principles of "security zone partition, dedicated network, horizontal isolation, and vertical authentication", building a security solution for power monitoring system.

Activity & Announcement
Solution architecture

Considering the customer's business features, deploy industrial control vulnerability devices on the network of the service centralized control center, comprehensively evaluate the assets, security status, high-risk vulnerabilities, and other information of the power monitoring system, and provide rectification methods and suggestions for the vulnerabilities and weaknesses in the system to help administrators patch vulnerabilities and comprehensively improve overall security.

Value to customer
Meet classified protection compliance requirements

Meet the compliance requirements such as National Energy Security No. 36 document and classified protection.

Analyze the current situation of system security

Analyze the overall security situation of the power monitoring system, put forward patch suggestions for different device vulnerabilities, and help administrators patch vulnerabilities.

Complete the current network topology

Based on the actual business scenarios, help on-site managers sort out the assets of the live network, complete the existing network topology, and enable the administrator to grasp the status of on-site assets.