These are security methods employed by the owner of a system to guard against any unauthorised user. There are physical and software protection.
The physical protection includes the use of security staff, mechanical devices, and electronic systems. Software protection is the use of programs to guard against unwanted users.
This can be done by configuring the system so that a password shall be required before the system is opened.