Explanation should include the six steps of the troubleshooting process for security.