2. Identity authentication: two-factor identity authentication, identity authentication based on digital certificate, identity authentication based on physiological characteristics, etc.
3. Access control: physical access control, network access control (such as network access control NAC), application access control and data access control.
4. Audit: physical audit (such as access control and video surveillance audit), network audit (such as network audit system and sniffer), application audit (realized during application development) and desktop audit (recording the modification, deletion and configuration of files and system equipment in the host).