The document discusses the goals and methods of computer protection. It aims to control access to resources and prevent their unauthorized use. Hardware protection differentiates between user and monitor modes. The CPU protects modes through a mode bit, and switches to monitor for interrupts. Memory protection prevents processes from accessing memory not allocated to them. I/O protection makes I/O instructions privileged to monitor mode only. The goals are to share resources safely according to policies and minimize damage from misbehaving programs.