Answer:
deletion of files: authentication
unpleasant comments: MAC address filtering
interception: encryption
access network: firewall
Step-by-step explanation:
Note that authentication is about proving who you are, and not about what you're allowed to do. So authentication by itself is only the first step. Next, you have to lookup the authorizations of the authenticated person to allow or disallow an action.