(This proves that there are still various security threats in today's network. In the face of these threats and attacks, what methods and technologies should be used to deal with them is the subject of today's research. The following introduces the principles of information security control and the commonly used security network technologies based on the principles of information security control.)