Typical application scenarios of terminal security include desktop management, illegal outreach and computer peripheral management.