With the popularization of various IT applications such as websites, smart phones, and artificial intelligence, we are in the wave of digital technological innovation. While enjoying various conveniences and flexibility in work and life, the boundaries of information security defense are Facing a state of continuous elimination. Recalling the past, many enterprises and organizations may restrict users to only browse specific websites. If access to the IT application services provided by the unit is required, only the personal computer issued by the company can be used, and it must be used on the internal network, or It is to connect back to the company through VPN.
