Describe various methods of protecting access to computer systems and data, including physical security and electronic entry systems.
Examples: locked doors, key entry doors, guard, receptionist, mantraps