Correct Answer : Network-security protocols
Explanation : The methods and processes in securing network data from unauthorized content extraction are controlled by network-security protocols.