Security vs. Protection
Main DifferenceHospital, in general, have a variety of units based on a specific purpose. Apart from regular rooms and ward admissions, critical patients are either shifted to ICU or a CCU. ICU stands for Intensive Care Unit while CCU stands for Cardiac Care Unit or Coronary Care Unit. Both these terms interrelate in order of their overall occurrence. ICU is a special care unit beside regular room or ward in the hospital, the patients with critical health conditions are kept for high-level care and monitoring. A patient usually after an operation or surgery is kept in the ICU in critical condition. CCU, on the other hand, is a more specific critical care unit beside ICU, regular room and normal hospital ward, that is particularly for the patients suffering from a cardiac disorder. In other words, we can regard a CCU as a special ICU for heart patients only. The major difference between an ICU and CCU is that ICU is mostly for surgical patients whereas a CCU is specifically for heart patients

Difference Between Security and Protection
Security vs. Protection
The Security provides a mechanism to check the user or process identity to allow it to use the machine. On the other hand, protection controls access to the system resources.
Security vs. Protection
Security is a broad term where more intricate queries are handled while protection comes under handles and security less elaborate issues.
Security vs. Protection
The Security policy describes whether the specific person is allowed to use the machine or not. As against, the protection policy specifies what the user can access the particular resource (eg. file).
Security vs. Protection
The protection requires the internal sort of threat whereas in Security outside threats are also involved.
Security vs. Protection
Authorization is used in protection mechanism. To the contrary, the security mechanism authenticates and encrypt the user or process to apply the data integrity.
Securitynoun
(uncountable) The condition of not being threatened, especially physically, psychologically, emotionally, or financially.
Jonna Nyman is an energy security expert at the University of Sheffield in England. File:Jonna Nyman is an energy security expert.oggProtectionnoun
The process of keeping (something or someone) safe.
Raincoats give protection from rain.Securitynoun
(countable) Something that secures.
Protectionnoun
The state of being safe.
Securitynoun
An organization or department responsible for providing security by enforcing laws, rules, and regulations as well as maintaining order.
Protectionnoun
A means of keeping or remaining safe.
Securitynoun
(legal) Something that secures the fulfillment of an obligation or law.
Protectionnoun
A means, such as a condom, of preventing pregnancy or sexually transmitted disease.
Securitynoun
(legal) Freedom from apprehension.
Protectionnoun
(insurance) Coverage.
Securitynoun
A tradeable financial asset, such as a share of stock.W
Protectionnoun
Immunity from harm obtained by illegal payments, as bribery or extortion.
Securitynoun
(finance) Proof of ownership of stocks, bonds or other investment instruments.
Protectionnoun
(economics) Restrictions on foreign competitors which limit their ability to compete with domestic producers of goods or services.
Securitynoun
(finance) Property etc. temporarily relinquished to guarantee repayment of a loan.
Protectionnoun
(computing) An instance of a security token associated with a resource (such as a file).
Securitynoun
A guarantee.
Protectionnoun
the activity of protecting someone or something;
the witnesses demanded police protectionSecuritynoun
(obsolete) Carelessness; negligence.
Protectionnoun
a covering that is intend to protect from damage or injury;
they had no protection from the falloutwax provided protection for the floorsSecuritynoun
the state of being free from danger or injury;
we support the armed services in the name of national securityProtectionnoun
defense against financial failure; financial independence;
his pension gave him security in his old ageinsurance provided protection against loss of wages due to illnessSecuritynoun
a formal declaration that documents a fact of relevance to finance and investment; the holder has a right to receive interest or dividends;
he held several valuable securitiesProtectionnoun
the condition of being protected;
they were huddled together for protectionhe enjoyed a sense of peace and protection in his new homeSecuritynoun
a department responsible for the security of the institution's property and workers;
the head of security was a former policemanProtectionnoun
kindly endorsement and guidance;
the tournament was held under the auspices of the city councilSecuritynoun
measures taken as a precaution against theft or espionage or sabotage etc.;
military security has been stepped up since the recent uprisingProtectionnoun
the imposition of duties or quotas on imports in order to protect domestic industry against foreign competition;
he made trade protection a plank in the party platformSecuritynoun
defense against financial failure; financial independence;
his pension gave him security in his old ageinsurance provided protection against loss of wages due to illnessProtectionnoun
payment extorted by gangsters on threat of violence;
every store in the neighborhood had to pay him protectionSecuritynoun
freedom from anxiety or fear;
the watch dog gave her a feeling of securitySecuritynoun
an electrical device that sets off an alarm when someone tries to break in
Securitynoun
property that your creditor can claim in case you default on your obligation;
bankers are reluctant to lend without good securitySecuritynoun
a guarantee that an obligation will be met
Comparison Chart
Security | Protection |
Provides the system access to legitimate users only. | Controls access to the system resources. |
Type of Threat Involved | |
External | Internal |
Policy | |
Describes which person is allowed to use the system. | Specifies what files can be accessed by a particular user. |
Handles | |
More complex concerns. | Quite simple queries. |
Mechanism | |
Authentication and encryption are performed. | Set or alter the authorization information. |
What is Security?
The security of a system revolves around the outside environment, and in addition, it requires a proper protection system. The security systems incorporate the protection of their computer resources against unauthorized access, malicious alteration, and inconsistency. Here in the special circumstance, the resources are the saved data in the system, CPU, memory, disks, etc..
The security of the system highlights the authentication process of the machine to be able to secure the physical resources in addition to the integrity of the data stored in the system. Security provides a mechanism to safeguard the user’s applications and data contrary to the interference brought on by an entity or individual external to the machine. For instance, in an organization that the data is obtained by different employees but, it can’t be obtained by a user that does not exist in that particular organization or a user working in other business enterprises. It’s the critical task for an organization to supply some safety mechanism so that no outside user can access the information of the organization.
What is Protection?
Protection is a component of safety which controls access to a system by optimizing the kinds of file access allowed to the users. The Protection of a system must ensure the consent of the users or processes. Because of this, these authorized users or processes can operate on the CPU, memory segments, and other sources. The protection mechanism should offer a medium for specifying the controls to be imposed, together with a way of enforcing them.
The Protection was perceived as an addition to a multiprogramming operating system, to stop untrustworthy users from sharing a common physical and logical namespaces, as an instance, a directory of files and memory respectively. Protection is required to intercept the wicked, intentional violation of an access restraint with a user. Though, it’s important to assure that every active program component existing in a system utilizing the system resources only in reliable ways as stated in policies. It includes the avoidance of user’s data and applications against interference by other users of this machine.
The protection can be translated by a similar example as given from the safety, any organization can have several departments under which many employees operate. The various departments can share frequent information with each other but not sensitive information. So, different workers have different access rights to the data according to which they can access the specific data.