authorized persons, procedures to control and prevent access to networks and network services, the means used to access securely, user authentication requirements, and monitoring the authorized uses of network