Please explain why authenticating the user is not sufficient to ensure an enterprise or ad hoc network's security.