Which of the following methods can security protection be used for enterprise terminal security?