Provide examples of the three types of controls and how they could be used to prevent (or slow down) attackers.