Section 5 About the network security