Problem: Describe the Kerberos network authentication protocol outlining the steps followed to complete the authentication process. Outline the why auditors require a thorough understanding of network authentication methods used to access a firms information systems. Explain your answer and provide examples.