What are the six critical components of an information system? Select three of the six components, and describe a potential vulnerability inherent with that component. Also describe what a threat agent might do to exploit that vulnerability.