Protection and Security
When sharing resources, protection of the systems and user resources from intentional as well as inadvertent misuse.
Protection generally deals with access control. Ex: Read only file
Security deals usually with threats from outside the system that affects the integrity and availability of the system and information with the system.
Example: username, password to access system. Data encryption to protect information.