djpope3027 djpope3027 01-06-2023 Computers and Technology contestada After the information that needs to be protected has been identified, what step should be completed next