Respuesta :

Answer:

Network - security protocols

Explanation:

The methods and processes in securing network data from unauthorized content extraction are controlled by network-security protocols