emmagrace40141 emmagrace40141 31-01-2024 Computers and Technology contestada What is the next step taken after we have completed identification and authentication in computer security? a) Authorization b) Encryption c) Firewall configuration d) System maintenance