In this chapter, the following content will be discussed: Security through obscurity, aspects of security, OSI security architecture, active and passive attacks, protection and access rights. After studying this chapter you will be able to describe the difference between security and protection, to understand access privileges and create access right metrix, to understand how different security tools be used.