Discussion on the Computer Information Security Technology and the Perfection Suggestion