Operating systems use protection and security techniques to counter threats to information. Protection involves guarding a user's data and programs from interference by other authorized users, while security guards against interference from unauthorized external entities. There are two facets to protection: secrecy, where only authorized users can access information, and privacy, where information is only used for its intended purpose. Security and protection policies are enforced through mechanisms like access control lists and authentication. The goals of security and protection are secrecy, privacy, authenticity, and integrity of information.