Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

Industrial Internet

Jointly build an industrial Internet security system

Background

The amplification, superposition, and multiplication of digital economic development are becoming more prominent as China places greater emphasis on digital economic development and accelerates the promotion of digital industrialization and industrial digitalization. New Internet technologies and applications are transforming traditional industries from every angle and chain. The integration of the Internet and industry has become a future development trend. The industrial Internet, as a result of the deep integration of the new generation of information technology and the manufacturing industry, will play an important role in promoting the development of the digital economy. Industrial enterprises are facing more complex and changing cyber security threats as China's industry transformation and upgrade from traditional industry to digitalization, networking, and intelligence. The security planning and protection of the entire industrial Internet production system is an important support for enterprise digitalization transformation strategic planning.

Relevant Policies
2021
In 2021, the Regulation on Protecting the Security of Critical Information Infrastructure (No. 745 Decree of the State Council) protected the key information infrastructure in the form of legislation. In 2019, the Cybersecurity Classified Protection 2.0 GB/T 22239-2019 Information Security Technology - Baseline for Classified Protection of Cybersecurity put forward new security extension requirements for industrial control systems.
2019
In 2019, the 2.0 BT22239-2019 "Basic Requirements for Network Security Level Protection of Information Security Technology" proposed new security extension requirements for industrial control systems.
2017
In 2017, the Cybersecurity Law of the People's Republic of China was the first law on cybersecurity in China.
2016
In 2016, the Guidelines for Information Security Protection of Industrial Control Systems ([2016] No. 338 Document of Ministry of Industry and Information Industry) put forward protection requirements for deepening the integrated development of the manufacturing industry and the Internet.
2002
In 2002, the Economic and Trade Commission issued Order No. 30 "Regulations on the Security Protection of Computer Monitoring Systems and Dispatch Data Networks for Power Grids and Power Plants", which first proposed the requirements for network security protection of power grids and power plants.
2021
In 2021, the Regulation on Protecting the Security of Critical Information Infrastructure (No. 745 Decree of the State Council) protected the key information infrastructure in the form of legislation. In 2019, the Cybersecurity Classified Protection 2.0 GB/T 22239-2019 Information Security Technology - Baseline for Classified Protection of Cybersecurity put forward new security extension requirements for industrial control systems.
Development Trend
The standard system has been gradually improved

In recent years, standards related to industrial Internet security have developed rapidly, including the Guidelines for the Construction of an Integrated Standardization System for Industrial Internet issued in 2019, the Guidelines for the classification of industrial data issued in 2020 (Trial), and the Regulation on Protecting the Security of Critical Information Infrastructure issued in 2021. In the future, industry standards, alliance standards, and national standards related to industrial Internet security will be further improved and developed, and the industrial Internet security industry will become more standardized.

Industrial data security has become the top priority

Industrial data comes from all aspects of the life cycle of industrial products and is the core of industrial Internet applications. The combination of industrial big data technology and industrial applications has enabled the collection and analysis of industrial data, and summarization, viewing, counting and disposal from the functional dimension. The security of industrial data is particularly important. In the future, how to ensure the security of industrial Internet data will become a common problem faced by industrial enterprises, Internet platform providers, equipment manufacturers, and security service providers.

Security protection technology is developing towards intelligence

Presently, an increasing number of security providers evaluate security incidents and continuously enhance the security protection system using AI technologies like machine learning and in-depth learning. They are dedicated to researching event correlation analysis technology and in-depth industrial protocol analysis technology at the same time. With the help of the large data analysis, event processing capability, and edge computing capability of the industrial Internet, they analyze the current operational status and predict the future trend, achieving overall control of industrial Internet security and successfully ensuring industrial Internet security.

Endogenous security is gradually maturing

In an industrial control system, the connection of control equipment is lack of security verification mechanism, and the communication protocol is lack of encryption and integrity verification, which poses high security risks to industrial security. Endogenous security based on self-security design will become mature. The control equipment will adopt effective access verification and security reinforcement to ensure its own safety and stability. The communication protocol will enhance its robustness in terms of encrypted transmission, access control, integrity verification, etc. to ensure the security of data and business.

An autonomous and controllable security system is under construction

Many Chinese industrial enterprises still rely on imported control equipment and systems. Many loopholes and backdoors are frequently exposed, and the situation is very severe. It is critical to establish a self-contained and controllable security system. As the premise of cyber security and information security, independent controllable products fully demonstrate the "security, reliability, and controllability" of independent products, effectively deal with foreign industrial control equipment, system loopholes, and backdoor problems, and deepen the security protection system.

The construction promoted by security policies is being implemented

The systematic construction of industrial Internet will introduce security risks from different levels. Therefore, it is urgent to establish a response plan based on multi-party cooperative risk disposal. Under the guidance of national policies, equipment providers, industrial enterprises, industrial Internet platforms, operators, security service providers and monitoring units should cooperate with each other to jointly establish industrial Internet security protection schemes, improve industrial Internet security information sharing and disposal linkage, and ensure the safe and stable operation of industrial Internet in China.

Users' Pain Points
The industrial mainframe runs with viruses, and the computing environment is full of crisis
Anti-virus software is rarely installed on industrial hosts. Even if they are installed, the virus database cannot be updated in a timely manner, and there is a lack of mobile storage media control, making it easy for viruses and Trojans to spread in the industrial production network.
The network protocol has many weaknesses, which can be exploited by attackers
More than 90% of industrial control devices that can be accessed externally use insecure network connection protocols, giving attackers the opportunity to conduct attacks, thus damaging the security of the communication network.
The industrial control vulnerability attack situation is critical, endangering production security
The number of vulnerabilities in industrial control devices grows year after year. Attackers exploit industrial control vulnerabilities to launch network attacks, resulting in security incidents such as device damage and process parameter tampering, putting industrial enterprises' production cyber security at risk.
Technical System
The enterprise safety technology system creates a dynamic closed-loop protection system that includes a safety protection detection system, a safety situation analysis system, and a safety service response system by comprehensively analyzing the safety risk problems existing in the industrial enterprise control system and combining the characteristics of the industrial control system. The safety protection detection system detects and protects the protection detection industrial control system and provides safety data information to the other two systems. The security situation analysis system combines security protection detection data and security service event information feedback, issues security strategies to the security protection detection system synchronously and dynamically in real time, and summarizes and reports security incident analysis results to the security service response system. The security service response system enables and supports security protection detection based on security situation analysis results.
Comprehensive Strength
With practical experience in cyber security, Topsec took the lead in proposing the idea of "behavior analysis as the basis, whitelist technology as the core, and blacklist technology as the criteria" for developing information security in the field of industrial control. With this idea, Topsec created 12 industrial Internet security product series, including the firewall, host guard, auditing, and trend analysis products for industrial control. Among them, 10 products and services were shortlisted for the leadership framework. Products, solutions, and services of Topsec have covered 22 business scenarios, including industrial Internet platforms, industrial data security, and industrial Internet identification analysis systems, and have been implemented in 35 sectors including electric power, petroleum, rail transit, metallurgy, coal, and machinery manufacturing. In terms of standard establishment and national scientific research projects, Topsec has led and participated in the formulation of 25 industrial Internet standards. Topsec has also undertaken and participated in more than 10 national scientific research projects initiated by national ministries and commissions, covering multiple dimensions including enterprise construction, platform construction, supervision system construction, and technological breakthrough. In this way, Topsec has effectively advanced the industrial Internet security capabilities of China from zero to the world-leading class. In addition, Topsec deeply integrates functional security and information security to create a "dual-security" system for building industrial Internet security systems, further consolidating the foundation of industrial Internet security in China.