(i) Physical Protection: It involves the use of security staff and mechanical devices for protection.
(ii) Software Protection: This prevents un-authorized users from getting access to the software.
(iii) Handshaking: It is a technique, which requires more than a simple password and may b used between two computers or a computer and a user as a means of access control.
(iv) Password Control: This is a secret code with which the user saves a file to lock it so as to prevent others from accessing the file.
(v) Authorization table: This table holds the relevant files and details the kind of access permitted by particular users or a group of users read only, read and write or delete.
(vi) Data encryption: It scrambles the data to make it unintelligible during transmission.