Protection can be accomplished in many ways usually by locks. In software, a lock is accomplished by having an ACL then using authentication and authorization to govern access.