Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

IoT

Build a hierarchical security defense capability for IoT

Background

With wide application of IoT and continuous development of supporting technologies, the types of attacks on IoT services are becoming more diverse. IoT devices have become a huge network attack entrance, security incidents are common, and IoT security issues have received a lot of attention. IoT is a typical large-scale distributed network system. Its distributed nodes frequently lack local security protection capabilities, are vulnerable to intrusion, and serve as a launchpad for attacks, affecting the security of the entire IoT system. The scattered and ineffective management of IoT terminals results in a terminal and information credibility crisis, making the status and returned data of IoT devices untrustworthy. The IoT security issue will not only cause significant economic losses, but will also threaten national security and social stability, posing tremendous security challenges to massive connections and massive IoT data.

Relevant Policies
2017
The Cyber security Law of the People's Republic of China, issued in 2017, was the first law on cyber security in China.
2018
GB/T 37044-2018 Security Reference Model and Generic Requirements for the Internet of Things was one of the first set of national standards for the IoT security technology issued by the National Information Security Standardization Technical Committee in 2018.
2018
GB/T 36951-2018 Security Technical Requirements for Application of Sensing Terminals in Internet of Things was one of the first set of national standards for IoT security technology issued by the National Information Security Standardization Technical Committee in 2018.
2018
GB/T 37024-2018 Security Technical Requirements of Gateway in Sensing Layer of Internet of Things was one of the first set of national standards for IoT security technology issued by the National Information Security Standardization Technical Committee in 2018.
2018
GB/T 37093-2018 Security Requirements for IoT Sensing Layer Access to Communication Network in 2018 was one of the first set of national standards for IoT security technology issued by the National Information Security Standardization Technical Committee.
2019
GB/T 22239-2019 Information Security Technology - Baseline for Classified Protection of Cybersecurity was the extended security requirements of the Cybersecurity Classified Protection 2.0 for IoT.
2021
The Guidelines for the Construction of Basic Security Standard Systems for the Internet of Things (Exposure Draft) issued by the Ministry of Industry and Information Technology in 2021 point out the need to strengthen the top-level design of security standardization work for IoT.
2017
The Cyber security Law of the People's Republic of China, issued in 2017, was the first law on cyber security in China.
Development Trend
The standard system has been gradually improved

In recent years, China has issued a number of policies, regulations, and security compliance requirements to improve the protection level and security standards of IoT and speed up the IoT security construction. From the Special Action Plan for the Development of the Internet of Things (2013 to 2015) and the Cybersecurity Classified Protection 2.0 expanded security requirements to clarify the baselines for planning the IoT security construction, to the initial establishment of a security standard system covering key basic environments by 2022 proposed in the Guidelines for the Construction of Basic Security Standard System for the Internet of Things (Exposure Draft) issued by the Ministry of Industry and Information Technology in January 2021, China is gradually improving policies and regulations for IoT security, further promoting the rapid development of IoT security.

IoT security has evolved into a necessary security guarantee of infrastructure

development and wide application of the new generation of IoT information technologies. IoT security construction has become the focus of new infrastructure programs, construction, and management. Accelerating IoT security construction will inject new momentum into China's high-quality economic transformation and innovative development of the digital economy.

The IoT security protection technology is developing towards omnipotence, intelligence, and collaboration

The growing demand for local service processing has put forward higher requirements for IoT security: the business carrying and security integration capability has become a trend. Machine learning, more accurate device fingerprint technology, and rapid discovery of security issues enable rapid access and service enabling of devices, and comprehensively build an end-to-end security system for the IoT network.

Users' Pain Points
The IoT terminals are difficult to manage and easily overlooked due to their wide variety
A wide range and variety of IoT terminals are used, lacking effective security management means, and most of IoT terminals are deployed in unattended scenarios, resulting in terminals damaged easily or replaced maliciously.
The collected data is easy to tamper with due to the distribution of sensing nodes
There are a large number of IoT nodes, and the massive data generated by them is not encrypted or encrypted at a weak level, resulting in malicious interception and tampering of the data and the inability to master the real-perceived data.
The edge security guarantee is weak due to frequent IoT vulnerabilities
The number of IoT vulnerabilities is on a high trend, causing great security risks. IoT devices are faced with higher security threats of intrusion and utilization, and it is easier to launch DDoS attacks on services platforms from terminals.
Technical System
The Topsec IoT security solution proposes a technical architecture that comprehensively covers the security issues of the sensing layer, network layer, and application layer of IoT, as well as identity authentication, network access, access control, and intrusion prevention capabilities for various IoT terminals. It provides edge computing, encrypted data storage, video encoding and decoding, and intelligent video analysis capabilities at the network edge. It also provides data fusion and network boundary protection capabilities for the application layer. The IoT security technology architecture for in-depth protection ensures the secure interconnection of IoT terminals in depth. It uses active perception and comprehensive monitoring to show the overall asset situation of the IoT network in a visual way, forming an IoT security protection system featuring rapid deployment, immediate effect, controllable management, and visual security.
Comprehensive Strength
Topsec provides customers with secure and reliable IoT security products and solutions and builds layered IoT security defense capabilities. These efforts are widely recognized by the industry.