According to Raggad's taxonomy of information security, a computing environment is made up of ?ve continuously interacting components namely; activities, people, data, technology and networks, and therefore a comprehensive security plan must take all these into account. Does protecting a computing environment merely mean protecting those five components? Why?