5.3 How to Determine the Security Protection Level of Network