a) According to the taxonomy of information security, a computing environment is made up of the ?ve continuously interacting elements namely; activities, people, technology, data and networks, and thus, a comprehensive security plan should take all these into account. Does protecting a computing environment merely mean protecting those five components? Explain why?