Explain security interdependence among components in a computing environment.Give three examples demonstrating security interdependence in an information system.