Explanation should involve clarifying well-documented usage policies to protect the network and network-accessible resources from unauthorized access. Network security features include