Research Article

Experimental Teaching of Information Security Based on Virtual Simulation

Figure 1

The relationship between system security requirements and security threats.