1. Hardware (server, terminal): The hardware is damaged and cannot be used.
2. Network (external network, internal network): network connection is attacked and infected with virus.
3. System (including application and data): application and data leakage.
General hardware is backed up, the internal and external networks are separated, and the system is regularly archived and encrypted.