The risk of tramsission path is reflected by illegal interception and tamper in public or wireless network, and the risk of illegal terminal access. Application system risk is of unauthorized access to information and network system resources, leak of sensitive data and the illegal attack to system.