the
protection of network storage and flow of information
resources does not malicious damage or leakage. Some
important information resources more need to be
protected, in order to prevent the use of various network
technology theft or damage. For example, some is related
to national security or science and technology of
important information resources, once the leak could
disrupt social order, and lead to serious economic loss.