In this lesson, we will discover different ways to protect software systems. This will include approaches to design and approaches to access.