Research Article

Experimental Teaching of Information Security Based on Virtual Simulation

Figure 2

The key technology of information security.