Unlocking the Hidden Connections Between Lock Picking and Cybersecurity