Protection and Security-Preventing harm to the system and to resources, either through wayward internal processes or malicious outsiders Authentication, ownership, and restricted access are obvious parts of this system Highly secure systems may log all process activity down to excruciating detail, and security regulation dictate the storage of those records on permanent non-erasable medium for extended times in secure off-site facilities• Protection and Security - Preventing harm to the system and to resources, either through wayward internal processes or malicious outsiders. • Authentication, ownership, and restricted access are obvious parts of this system. • Highly secure systems may log all process activity down to excruciating detail, and security regulation dictate the storage of those records on permanent non-erasable medium for extended times in secure ( off-site ) facilities