2. Secondly, fill in the network security information: In the second part of the form, you need to fill in the network security information of your company.
3. Finally, fill in the information security: In the third part of the form, you need to fill in the information security of the unit.