The separation of protection and security is a design choice. Protection is identified as a mechanism, which means that it is a device that changes an input into a desired output. Security is identified as a policy, which is a procedure to guide the decision making process. Security relies on the protective mechanisms along with cryptology techniques. Protection has security policies that are supported by protective mechanisms and decides which information a user can access within the system. Another type of protection is available by UNIX security, which allows the system to be protected by or from other users. The UNIX security is more about protection than actual security; it is for users and groups.
Another form of protection is the take-grant protection model that is used to disprove the safety of a system that follows specific rules. There are four rules which is the take rule, grant rule, create rule, and the remove rule. The take rule revokes the privileges of another object. The grant rule gives the authority to a subject in order to apply its rights to an object. The create rules grants a subject the ability to form new objects. The remove rule gives a subject the authority to revoke the rights that it has applied on another object. Security is defined is 5 aspects:
“• unauthorized reading of information
• unauthorized modification of information
• unauthorized destruction of data
• unauthorized use of resources
• denial of service for authorized uses”
Information security deals with the defense against improper use or access of information. There are two types of information security, there is IT security and there’s information assurance. IT security is a security applied to electronics with processors, such as hand held devices. It is also responsible for helping defend against cyber attacks that attempt to gain access to private information of large companies or the likes.