Relate access control in the computer world to the physical world. In your own words, provide an example of physical access control and tie it back to the digital landscape. Often in cybersecurity, we use compensating controls to mitigate vulnerabilities. Identify some physical vulnerabilities related to your example. What are some compensating controls we could use? Explain your reasoning.