protection

(redirected from protect)
Also found in: Dictionary, Thesaurus, Medical, Legal, Financial, Acronyms, Idioms, Wikipedia.

protection

protection, practice of regulating imports and exports with the purpose of shielding domestic industries from foreign competition. To accomplish that end, certain imports may be excluded entirely, import quotas may be established, or bounties paid on certain exports. One method is to impose duties on imports (see tariff), increasing the price of the imported article, and making it less attractive to the consumer than the cheaper, domestically produced article. In the 20th cent. Britain used a system of protection known first as imperial preference and later as Commonwealth preference, designed to promote close economic relations between Britain and former colonial dependencies. The United States, however, followed the policy of protecting “infant industries” from the beginning of its national history. Since bounties on exports are forbidden by the Constitution, the protective tariff was the chief instrument of such policy. A brief attempt was made in 1913 to lower duties, but after World War I tariff rates were raised to the highest point in U.S. history. Although American industries had grown to a position of great strength, it was still held that they needed protection from the cheaper labor and lower costs of production in many foreign countries.

To promote freer trade during the Great Depression, President Franklin Delano Roosevelt received authorization in 1934 to negotiate reciprocal trade agreements, reducing tariff rates on a far-reaching basis through the use of the most-favored-nation clause. After World War II, the United States played a leading role in the formation (1948) of the General Agreement on Tariffs and Trade (GATT) and in negotiating the several rounds of multilateral tariff reductions, most recently (1986) the Uruguay round, which led to the formation of the World Trade Organization. Other important steps in the movement toward freer trade and away from protection include the formation of the European Economic Community (or Common Market; now part of European Union) in 1957 and the European Free Trade Association in 1959. In 1992, the United States, Canada, and Mexico negotiated the North American Free Trade Agreement (NAFTA), which created the world's largest trading zone.

Although the United States is no longer a high-tariff nation, it still has a number of restrictive import quotas that provide a definite limit on the quantity of a given commodity that can be imported from another nation. Japan, one of the world's major industrial nations, also has many import quotas. Such quotas, in addition to being more certain methods of protection than tariffs, can also be used to favor certain nations over others.

Bibliography

See W. M. Corden, Protection, Growth and Trade (1985); J. N. Bhagwati, Protectionism (1988).

The Columbia Electronic Encyclopedia™ Copyright © 2022, Columbia University Press. Licensed from Columbia University Press. All rights reserved.

Protection

The Secretary of the Interior’s Standards indicates that protection means “to effect the physical conditions of a property by defending or guarding it from deterioration, loss or attack, or to cover or shield the property from damage or injury.” In the case of buildings, it is generally temporary, anticipating future historic preservation treatment.
Illustrated Dictionary of Architecture Copyright © 2012, 2002, 1998 by The McGraw-Hill Companies, Inc. All rights reserved

protection

[prə′tek·shən]
(nucleonics)
Any provision to reduce exposure of persons to radiation; for example, protective barriers to reduce external radiation or measures to prevent inhalation of radioactive materials.
McGraw-Hill Dictionary of Scientific & Technical Terms, 6E, Copyright © 2003 by The McGraw-Hill Companies, Inc.

building preservation

The process of applying measures to maintain and sustain the existing materials, integrity, and form of a building, including its structure and building artifacts.
McGraw-Hill Dictionary of Architecture and Construction. Copyright © 2003 by McGraw-Hill Companies, Inc.

Protection

See also Charms.
aegis
protective mantle of Zeus given to Athena. [Gk. Myth.: Brewer Dictionary]
alum
charm against evil eye. [Egyptian Folklore: Leach, 40]
amethyst
preserved soldiers from harm; gave them victory. [Gem Symbolism: Kunz, 58]
bennet
excludes the devil; used on door frames. [Medieval Folklore: Boland, 56]
blood of the lamb
used to mark houses of the Israelites so they could be passed over. [O.T.: Exodus 12:3–13]
chrysoberyl
guards against evil spirits. [Gem Symbolism: Kunz, 65]
cross
used to frighten away devils and protect from evil. [Christian Iconog.: Leach, 265]
daisy
provides protection against fairies. [Flower Symbolism: Briggs, 87]
horseshoe
hung on buildings as defense against fairies. [Br. Folklore: Briggs, 225]
jacinth
guards against plague and wounds. [Gem Symbolism: Kunz, 81]
kolem
rice designs drawn to attract guardianship of gods. [Hinduism: Binder, 61]
magic
flute Tamino’s guard against black magic. [Ger. Opera: Mozart, Magic Flute, Westerman, 102–104]
malachite
guards wearer from evil spirits, enchantments. [Gem Symbolism: Kunz, 97]
mark of Cain
God’s safeguard for Cain from potential slayers. [O.T.: Genesis 4:15]
moly
herb given by Hermes to Odysseus to ward off Circe’s spells. [Gk. Myth.: Odyssey]
rowan
ash tree which guards against fairies and witches. [Br. Folklore: Briggs, 344]
St. Benedict’s
cross charm against disease and danger. [Christian Iconog.: Jobes, 386]
St. Christopher
medal to protect travelers. [Christian Hist.: NCE, 552]
St. John’s wort
defense against fairies, evil spirits, the Devil. [Br. Folklore: Briggs, 335–336]
sard
guards against incantations and sorcery. [Gem Symbolism: Kunz, 107]
serpentine
guards against bites of venomous creatures. [Gem Symbolism: Kunz, 108]
wood
knocking on it averts dire consequences. [Western Culture: Misc.]
Allusions—Cultural, Literary, Biblical, and Historical: A Thematic Dictionary. Copyright 2008 The Gale Group, Inc. All rights reserved.

protection

1. 
a. the imposition of duties or quotas on imports, designed for the protection of domestic industries against overseas competition, expansion of domestic employment, etc.
b. the system, policy, or theory of such restrictions
2. a document that grants protection or immunity from arrest or harassment to a person, esp a traveller
3. Mountaineering security on a climb provided by running belays, etc.
Collins Discovery Encyclopedia, 1st edition © HarperCollins Publishers 2005

access control

The management of admission to system and network resources. It grants authenticated users access to specific resources based on company policies and the permission level assigned to the user or user group. Access control often includes authentication, which proves the identity of the user or client machine attempting to log in. See network access control, authentication, access control list and information security.

antivirus program

Software that searches for viruses. Also known as a "virus scanner." As new viruses are discovered by the antivirus vendor, their binary patterns and behaviors are added to a database that is downloaded periodically to the user's antivirus program via the Web. Popular antivirus programs are Norton, McAfee, Sophos, Bitdefender, AVG and Kaspersky. Microsoft Defender is Microsoft's own antivirus software that comes with Windows, starting with Windows 8.

Antivirus programs are used on all Windows machines, but most Mac users do not install them. However, as more Macs are acquired, the Mac has slowly but surely become a target of attacks, and Mac antivirus programs are being installed at a more rapid rate than in the past. See virus, quarantine, disinfect and scareware.

Multiple Detection Approaches
Early antivirus scanning matched the binary signature (pattern) of executable files against a database of known malware signatures before they were allowed to run. This "scanning" process was vastly speeded up by doing a one-time scan of all the executables in the computer and also when a new one is installed. If the executable is virus free, a checksum (hash) of its binary pattern is computed and stored in a checksum database. The next time the executable is launched by the user, its checksum is recomputed and compared with the virus-free checksum. If they match, the file was not adulterated.

Because malware may generate a unique signature each time it is downloaded to an unsuspecting user, antivirus programs also use behavior detection, which looks for suspicious activities such as copying and deleting files when launched (see behavior detection). See Symantec, McAfee, Sophos, Bitdefender, AVG, checksum, virus, polymorphic virus and Reputation-based Security.


Scan and Create a Checksum (Hash)
This is commonly used to speed up antivirus scanning, because computing and comparing an executable's checksum is considerably faster than analyzing the file each time it is loaded.

endpoint security

(1) An umbrella term for security in the user's machine (client machine).

(2) Diagnosing the status of a user's computer or mobile device when it connects to the network. Also called, "network access protection" (NAP), the security software is deployed in both the client and server side. It determines if the operating system, Web browser and other applications are up-to-date. It also checks the status of the antivirus, firewall and other security components. If a device is deemed non-compliant, it is either updated, or access to the network is declined. See network access control, lock down and vSentry.

firewall

The primary method for keeping a computer secure from intruders. A firewall allows or blocks traffic into and out of a private network or the user's computer. Firewalls are widely used to give users secure access to the Internet as well as to separate a company's public Web server from its internal network. Firewalls are also used to keep internal network segments secure; for example, the accounting network might be vulnerable to snooping from within the enterprise.

In the home, a personal firewall typically comes with or is installed in the user's computer (see Windows Firewall). Personal firewalls may also detect outbound traffic to guard against spyware, which could be sending your surfing habits to a website. They alert you when software makes an outbound request for the first time (see spyware).

In the organization, a firewall can be a stand-alone machine (see firewall appliance) or software in a router or server. It can be as simple as a single router that filters out unwanted packets, or it may comprise a combination of routers and servers each performing some type of firewall processing. For more about the various firewall techniques, see firewall methods. See WAF.


An Excellent Resource
O'Reilly's "Building Internet Firewalls, 2nd Edition" by Zwicky, Cooper and Chapman is one of the best books written on Internet and Web security. It covers a huge range of firewall and related topics and should be a "must have" for anyone interested in the subject. (O'Reilly & Associates, Inc., 2000)

information security

The protection of data against unauthorized access. Programs and data can be secured by issuing passwords and digital certificates to authorized users. However, passwords only validate that a correct number has been entered, not that it is the actual person. Digital certificates and biometric techniques (fingerprints, eyes, voice, etc.) provide a more secure method (see authentication). After a user has been authenticated, sensitive data can be encrypted to prevent eavesdropping (see cryptography).

Authorized Users Can Be the Most Dangerous
Although precautions can be taken to authenticate users, it is much more difficult to determine if an authorized employee is doing something malicious. Someone may have valid access to an account for updating, but determining whether phony numbers are being entered requires a great deal more processing. The bottom line is that effective security measures are always a balance between technology and personnel management. See Parkerian hexad, information assurance, security scan, security audit, audit trail, NCSC, ICSA, access control, share-level security, user-level security and social engineering.


Facial Recognition
Facial recognition is one of the best ways to authenticate a person. This TrueFace system from Miros uses neural network technology to distinguish a face with different appearances, such as with and without glasses and changing hair styles. (Image courtesy of Miros, Inc.)
Copyright © 1981-2019 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
References in periodicals archive ?
Inciting people to violence is not constitutionally protected, and neither is making knowingly false or slanderous statements about people.
Any user has to be correctly identified through a multiple series of passwords and other identification codes in order to enter any protected files.
Answers to those questions depend more on the information we are seeking to protect, the vulnerability of data, and the amount of trust customers put in the company holding that data.
When the three offensive players (1, 2, & 3) lose possession of the ball because of a made shot, a missed shot, or a turnover, either the shooter or the player who committed the turnover must turn and sprint back to protect the far basket by himself.
- By applying both the "HIBUN Information Cypher (IC)" operating code and the "HIBUN AE Information Fortress (IF)" which controls information extraction, documents other than Office documents may also be protected.
Now go to the Excel toolbar and click on Tools, Protection, Protect Sheet (see screenshot below).
Yet, if I asked you whether or not the data fields that hold your clients' Social Security numbers inside your accounting software protect that information with a layer of encryption, could you confidently answer "yes"?
* Most celebrity policies protect against either permanent total disability without hope of improvement or temporary total disability.
policy calls for the use of military force to protect the flow of oil from the Persian Gulf, an extended Carter Doctrine now justifies similar action in the Caspian Sea region, Latin America, and the west coast of Africa.
At home, Congress has already beaten trade chiefs in the rush to protect biological wealth.
The authorities had posted a sign warning that ducks were protected by law and anyone disturbing the duck on her nest would be prosecuted.

Full browser ?