VARSHA4245IN VARSHA4245IN Science Answered The first line of defense against illicit use of, or threats to, computer resources and sensitive information is a strong authentication and __________ process.