Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

Integrated monitoring system industrial control security project for a subway

There are many security threats in the network structure of the customer's integrated monitoring system. The areas are not logically separated, and the key facilities are not protected. The network is extremely prone to security threats such as intrusion attacks, virus infections, illegal access, malicious operations, and misoperations, which are major hidden dangers in the operation of the integrated monitoring system. It is necessary to deploy security protection measures at the boundary of the control center and the network boundary of the station/depot to prevent security threats from inside or outside the control system, and provide a reliable guarantee for the development of business continuity and informatization construction.

Background

According to the service features and current network structure of the comprehensive monitoring system of a metro line in Henan, formulate a targeted technical plan and management plan combined with the relevant requirements of the national cybersecurity classified protection. Provide guidance for the construction and implementation of the level protection security system for the comprehensive monitoring system of this subway line, and complete the network security construction of the comprehensive monitoring system, improving network security protection capabilities, solving problems such as lack of security protection measures between comprehensive monitoring systems at all levels and interconnection access systems, and lack of access control between systems, and providing reliable guarantees for business continuity and informatization development.

Activity & Announcement
Solution architecture

According to the service features of the integrated monitoring system, deploy two industrial control firewalls at the interconnection between the control center and other systems, at the interconnection between the maintenance center and the wire control room for security zone allocation and security behavior control. Perform in-depth protocol analysis on the data packets passing the TopIFW. Filter the data packets according to the produced security behavior policy, discard all communication connections or operation behaviors that do not meet the security policy, prevent unauthorized access, and prevent all kinds of illegal attacks. The existing production network is divided into security zones, and each security zone/or important security zones are isolated and protected by deploying a TopIFW.

Value to customer
Construct the "white environment" of the integrated monitoring system network

Through the security technical methods based on the business behavior, the integrated monitoring system network "white environment" is constructed. Security protection is performed around the business without changing the original network architecture.

Guarantee business availability, continuity, and real-time performance

Guarantee the business availability, continuity, and real-time performance of industrial control system.

Meet compliance requirements

Comply with business features of the integrated monitoring system, meet the compliance requirements, and respond to the national call. Suitable for the construction and promotion of other system security classified protection of urban rail transit.