This document provides an outline for a lecture on protection in general-purpose operating systems. It covers protected objects, methods of protection like memory protection techniques, access control, file protection, and user authentication. The outline includes sections on the history of protection in operating systems, protected objects, security methods like separation and levels of protection, memory protection techniques like segmentation and paging, access control for objects, file permissions, and user authentication using passwords. It is intended as a guide for a lecture on various techniques used in operating systems to protect resources and enforce access control policies for users and processes.