Security is protection from, or resilience against,
potential
Potential generally refers to a currently unrealized ability. The term is used in a wide variety of fields, from physics to the social sciences to indicate things that are in a state where they are able to change in ways ranging from the simple r ...
harm (or other unwanted
coercion
Coercion involves compelling a party to act in an involuntary manner through the use of threats, including threats to use force against that party. It involves a set of forceful actions which violate the free will of an individual in order to i ...
).
Beneficiaries
A beneficiary in the broadest sense is a natural person or other legal entity who receives money or other benefits from a benefactor. For example, the beneficiary of a life insurance policy is the person who receives the payment of the amount of ...
(technically
referent
A referent ( ) is a person or thing to which a name – a linguistic expression or other symbol – refers. For example, in the sentence ''Mary saw me'', the referent of the word ''Mary'' is the particular person called Mary who is being spoken o ...
s) of security may be persons and social groups, objects and institutions, ecosystems, or any other entity or phenomenon vulnerable to unwanted change.

Security mostly refers to protection from hostile forces, but it has a wide range of other senses: for example, as the absence of harm (e.g.,
freedom from want
The right to an adequate standard of living is listed as part of the Universal Declaration of Human Rights that was accepted by the General Assembly of the United Nations on December 10, 1948.United Nations''Universal Declaration of Human Right ...
); as the presence of an essential good (e.g.,
food security
Food security is the state of having reliable access to a sufficient quantity of affordable, healthy Human food, food. The availability of food for people of any class, gender, ethnicity, or religion is another element of food protection. Simila ...
); as
resilience against potential damage or harm (e.g. secure foundations); as secrecy (e.g., a
secure telephone line); as containment (e.g., a
secure room or
cell); and as a state of mind (e.g.,
emotional security
Insecurity is the emotion associated with a lack of confidence within oneself. It is often associated with feelings of fear and uncertainty, especially surrounding one's abilities. The word was originally used in the psychological sense in the yea ...
).
Security is both a feeling and a state of reality. One might feel secure when one is not actually so; or might feel insecure despite being safe. This distinction is usually not very clear to express in the English language.
The term is also used to refer to acts and systems whose purpose may be to provide security (
security company,
security police
Security police usually describes a law enforcement agency which focuses primarily on providing security and law enforcement services to particular areas or specific properties. They may be employed by governmental, public, or private institutio ...
,
security forces
Security forces are statutory organizations with internal security mandates. In the legal context of several countries, the term has variously denoted police and military units working in concert, or the role of irregular military and paramilitar ...
,
security service,
security agency
A security agency is a governmental organization that conducts intelligence activities for the internal security of a state. They are the domestic cousins of foreign intelligence agencies, and typically conduct counterintelligence to thwart other ...
,
security guard
A security guard (also known as a security inspector, security officer, factory guard, or protective agent) is a person employed by a government or private party to protect the employing party's assets (property, people, equipment, money, etc.) ...
,
cyber security systems,
security cameras,
remote guarding). Security can be
physical and
virtual.
Etymology
The word 'secure' entered the English language in the 16th century.
It is derived from Latin ''securus'', meaning freedom from anxiety: ''se'' (without) + ''cura'' (care, anxiety).
Overview
Referent
A security
referent
A referent ( ) is a person or thing to which a name – a linguistic expression or other symbol – refers. For example, in the sentence ''Mary saw me'', the referent of the word ''Mary'' is the particular person called Mary who is being spoken o ...
is the focus of a security policy or discourse; for example, a referent may be a potential beneficiary (or victim) of a security policy or system.
Security referents may be persons or social groups, objects, institutions, ecosystems, or any other phenomenon vulnerable to unwanted change by the forces of its environment.
[Barry Buzan, Ole Wæver, and Jaap de Wilde, ''Security: A New Framework for Analysis'' (Boulder: Lynne Rienner Publishers, 1998), p. 32] The referent in question may combine many referents in the same way that, for example, a nation-state is composed of many individual citizens.
Context
The security context is the relationships between a security referent and its environment.
From this perspective, security and insecurity depend first on whether the environment is beneficial or hostile to the referent and also on how capable the referent is of responding to their environment in order to survive and thrive.
Capabilities
The means by which a referent provides for security (or is provided for) vary widely. They include, for example:
* ''Coercive capabilities'', including the capacity to project coercive power into the environment (e.g.,
aircraft carriers
An aircraft carrier is a warship that serves as a seagoing airbase, equipped with a full-length flight deck and hangar facilities for supporting, arming, deploying and recovering shipborne aircraft. Typically it is the capital ship of a fl ...
,
handguns,
firearms
A firearm is any type of gun that uses an explosive charge and is designed to be readily carried and operated by an individual. The term is legally defined further in different countries (see legal definitions).
The first firearms originated ...
);
* ''Protective systems'' (e.g.,
lock
Lock(s) or Locked may refer to:
Common meanings
*Lock and key, a mechanical device used to secure items of importance
*Lock (water navigation), a device for boats to transit between different levels of water, as in a canal
Arts and entertainme ...
,
fence
A fence is a structure that encloses an area, typically outdoors, and is usually constructed from posts that are connected by boards, wire, rails or net (textile), netting. A fence differs from a wall in not having a solid foundation along its ...
,
wall
A wall is a structure and a surface that defines an area; carries a load; provides security, shelter, or soundproofing; or serves a decorative purpose. There are various types of walls, including border barriers between countries, brick wal ...
,
antivirus software
Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware.
Antivirus software was originally developed to detect and remove computer viruses, hence the name ...
,
air defence system,
armour
Armour (Commonwealth English) or armor (American English; see American and British English spelling differences#-our, -or, spelling differences) is a covering used to protect an object, individual, or vehicle from physical injury or damage, e ...
)
* ''Warning systems'' (e.g., alarm,
radar
Radar is a system that uses radio waves to determine the distance ('' ranging''), direction ( azimuth and elevation angles), and radial velocity of objects relative to the site. It is a radiodetermination method used to detect and track ...
)
* ''Diplomatic and social action'' intended to prevent insecurity from developing (e.g. conflict prevention and transformation strategies); and
* ''Policy'' intended to develop the lasting economic, physical, ecological, and other conditions of security (e.g.,
economic
An economy is an area of the Production (economics), production, Distribution (economics), distribution and trade, as well as Consumption (economics), consumption of Goods (economics), goods and Service (economics), services. In general, it is ...
reform,
ecological
Ecology () is the natural science of the relationships among living organisms and their environment. Ecology considers organisms at the individual, population, community, ecosystem, and biosphere levels. Ecology overlaps with the closely re ...
protection,
progressive demilitarization,
militarization
Militarization, or militarisation, is the process by which a society organizes itself for military conflict and violence. It is related to militarism, which is an ideology that reflects the level of militarization of a state. The process of mil ...
).
Effects
Any action intended to provide security may have multiple effects. An action may have a wide benefit, enhancing security for several or all security referents in the context; alternatively, the action may be effective only temporarily, benefit one referent at the expense of another, or be entirely ineffective or counterproductive.
Contested approaches
Approaches to security are contested and the subject of debate. For example, in debate about
national security strategies, some argue that security depends principally on developing protective and coercive capabilities in order to protect the security referent in a hostile environment (and potentially to project that power into its environment, and dominate it to the point of
strategic supremacy). Others argue that security depends principally on building the conditions in which equitable relationships can develop, partly by reducing antagonism between actors, ensuring that fundamental needs can be met, and also ensuring that differences of interest can be negotiated effectively.
Security contexts (examples)
The table shows some of the main domains where security concerns are prominent.
Informational
*
Application security
*
Communications security
Communications security is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while still delivering content to the intended recipients.
In the North Atlantic Treaty Organization ...
*
Computer security
Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and computer network, n ...
*
Data security
Data security or data protection means protecting digital data, such as those in a database, from destructive forces and from the unwanted actions of unauthorized users, such as a cyberattack or a data breach.
Technologies
Disk encryption
...
*
Digital security
*
Endpoint security
Endpoint security or endpoint protection is an approach to the protection of computer networks that are remotely bridged to client devices. The connection of endpoint devices such as laptops, tablets, mobile phones, and other wireless devices t ...
*
Information security
Information security is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data ...
*
Internet security
Internet security is a branch of computer security. It encompasses the Internet, browser security, web site security, and network security as it applies to other applications or operating systems as a whole. Its objective is to establish rules ...
*
Network security
*
Usable security
Physical
*
Airport security
Airport security includes the techniques and methods used in an attempt to protect passengers, staff, aircraft, and airport property from malicious harm, crime, terrorism, and other threats.
Aviation security is a combination of measures and hum ...
*
Corporate security
*
Food security
Food security is the state of having reliable access to a sufficient quantity of affordable, healthy Human food, food. The availability of food for people of any class, gender, ethnicity, or religion is another element of food protection. Simila ...
*
Energy security
Energy security is the association between national security and the availability of natural resources for energy consumption (as opposed to household energy insecurity). Access to cheaper energy has become essential to the functioning of modern ...
*
Environmental security
Environmental security examines threats posed by environmental events and trends to individuals, communities or nations. It may focus on the impact of human conflict and international relations on the environment, or on how environmental problem ...
*
Home security
Home security includes both the Security alarm, security hardware placed on a property and individuals' Security of person, personal security practices. Security hardware includes doors, locks, alarm systems, lighting, motion detectors, and secu ...
*
Infrastructure security
*
Physical security
Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment, and resources and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks). Physi ...
*
Port security/
Supply chain security
*
Security bag
*
Security print
*
Border security
Border control comprises measures taken by governments to monitor and regulate the movement of people, animals, and goods across land, air, and maritime borders. While border control is typically associated with international borders, it als ...
*
Security seal
Political
*
National security
National security, or national defence (national defense in American English), is the security and Defence (military), defence of a sovereign state, including its Citizenship, citizens, economy, and institutions, which is regarded as a duty of ...
*
Public security
Public security or public safety is the prevention of and protection from events that could endanger the safety and security of the public from significant danger, injury, or property damage. It is often conducted by a state government to ensu ...
*
Homeland security
Homeland security is an American national security term for "the national effort to ensure a homeland that is safe, secure, and resilient against terrorism and other hazards where American interests, aspirations, and ways of life can thrive" to ...
*
Internal security
Internal security is the act of keeping peace within the borders of a sovereign state or other Self-governance, self-governing territories, generally by upholding the national law and defending against internal security threats. This task and rol ...
*
International security
''International Security'' is a peer-reviewed academic journal in the field of international and national security. It was founded in 1976 and is edited by the Belfer Center for Science and International Affairs at Harvard University and publis ...
*
Human security
Human security is a paradigm for understanding global social vulnerability, vulnerabilities whose proponents challenge the traditional notion of national security through military security by arguing that the proper referent for security should be ...
*
Societal security
Monetary
*
Economic security
Economic security or financial security is the condition of having stable income or other resources to support a standard of living now and in the foreseeable future. It includes:
* probable continued solvency
* predictability of the future cash ...
*
Social security
Welfare spending is a type of government support intended to ensure that members of a society can meet basic human needs such as food and shelter. Social security may either be synonymous with welfare, or refer specifically to social insurance ...
The range of security contexts is illustrated by the following examples (in alphabetical order):
Computer security
Computer security, also known as cybersecurity or IT security, refers to the security of computing devices such as
computer
A computer is a machine that can be Computer programming, programmed to automatically Execution (computing), carry out sequences of arithmetic or logical operations (''computation''). Modern digital electronic computers can perform generic set ...
s and smartphones, as well as
computer network
A computer network is a collection of communicating computers and other devices, such as printers and smart phones. In order to communicate, the computers and devices must be connected by wired media like copper cables, optical fibers, or b ...
s such as private and public networks, and the
Internet
The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
. The field has growing importance due to the increasing reliance on computer systems in most societies. It concerns the protection of hardware, software, data, people, and also the procedures by which systems are accessed. The means of computer security include the
physical security
Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment, and resources and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks). Physi ...
of systems and the
security of information held on them.
Corporate security
Corporate security refers to the resilience of
corporation
A corporation or body corporate is an individual or a group of people, such as an association or company, that has been authorized by the State (polity), state to act as a single entity (a legal entity recognized by private and public law as ...
s against
espionage
Espionage, spying, or intelligence gathering, as a subfield of the intelligence field, is the act of obtaining secret or confidential information ( intelligence). A person who commits espionage on a mission-specific contract is called an ...
, theft, damage, and other threats. The security of corporations has become more complex as reliance on IT systems has increased, and their physical presence has become more highly distributed across several countries, including environments that are, or may rapidly become, hostile to them.
Environmental security
Environmental security, also known as ecological security, refers to the integrity of
ecosystem
An ecosystem (or ecological system) is a system formed by Organism, organisms in interaction with their Biophysical environment, environment. The Biotic material, biotic and abiotic components are linked together through nutrient cycles and en ...
s and the
biosphere
The biosphere (), also called the ecosphere (), is the worldwide sum of all ecosystems. It can also be termed the zone of life on the Earth. The biosphere (which is technically a spherical shell) is virtually a closed system with regard to mat ...
, particularly in relation to their capacity to sustain a
diversity of life-forms (including human life). The security of ecosystems has attracted greater attention as the impact of ecological damage by humans has grown.
Home security
Home security normally refers to the security systems used on a property used as a dwelling (commonly including doors, locks, alarm systems, lighting, fencing); and personal security practices (such as ensuring doors are locked, alarms are activated, windows are closed etc.)
Human security

Human security is an emerging
paradigm
In science and philosophy, a paradigm ( ) is a distinct set of concepts or thought patterns, including theories, research methods, postulates, and standards for what constitute legitimate contributions to a field. The word ''paradigm'' is Ancient ...
that, in response to traditional emphasis on the right of nation-states to protect themselves, has focused on the primacy of the security of people (individuals and communities). The concept is supported by the
United Nations General Assembly
The United Nations General Assembly (UNGA or GA; , AGNU or AG) is one of the six principal organs of the United Nations (UN), serving as its main deliberative, policymaking, and representative organ. Currently in its Seventy-ninth session of th ...
, which has stressed "the right of people to live in
freedom
Freedom is the power or right to speak, act, and change as one wants without hindrance or restraint. Freedom is often associated with liberty and autonomy in the sense of "giving oneself one's own laws".
In one definition, something is "free" i ...
and
dignity
Dignity is a human's contentment attained by satisfying physiological needs and a need in development. The content of contemporary dignity is derived in the new natural law theory as a distinct human good.
As an extension of the Enlightenment- ...
" and recognized "that all individuals, in particular vulnerable people, are entitled to
freedom from fear
Freedom from fear is listed as a fundamental human right according to The Universal Declaration of Human Rights, adopted in 1948. On January 6, 1941, United States President of the United States, President Franklin D. Roosevelt called it one of t ...
and
freedom from want
The right to an adequate standard of living is listed as part of the Universal Declaration of Human Rights that was accepted by the General Assembly of the United Nations on December 10, 1948.United Nations''Universal Declaration of Human Right ...
".
Information security
Information security refers to the security of information in any form. Spoken, written, digital, networked, technological, and procedural forms of information are all examples that may be covered in an
information security management scheme. Computer security,
IT security,
ICT security, and
network security are thus all subdomains of information security.
National security
National security refers to the security of a
nation-state
A nation state, or nation-state, is a political entity in which the state (a centralized political organization ruling over a population within a territory) and the nation (a community based on a common identity) are (broadly or ideally) con ...
, including its people, economy, and institutions. In practice, state governments rely on a wide range of means, including
diplomacy
Diplomacy is the communication by representatives of State (polity), state, International organization, intergovernmental, or Non-governmental organization, non-governmental institutions intended to influence events in the international syste ...
,
economic power
Economic power refers to the ability of countries, businesses or individuals to make decisions on their own that benefit them. Scholars of international relations also refer to the economic power of a country as a factor influencing its power in ...
, and
military capabilities.
Resource security
"Resource security" refers to the political and
commercial
Commercial may refer to:
* (adjective for) commerce, a system of voluntary exchange of products and services
** (adjective for) trade, the trading of something of economic value such as goods, services, information or money
* a dose of advertising ...
objective of ensuring that supplies of materials needed for the production of goods and the satisfaction of
human needs can be reliably sustained into the future. It involves protecting the supply of such resources as water, energy, food and industrial
raw material
A raw material, also known as a feedstock, unprocessed material, or primary commodity, is a basic material that is used to produce goods, finished goods, energy, or intermediate materials/Intermediate goods that are feedstock for future finished ...
s from risks of
global depletion and risks to national supply incurred by trade restrictions, government or terrorist interference or
market failure
In neoclassical economics, market failure is a situation in which the allocation of goods and services by a free market is not Pareto efficient, often leading to a net loss of economic value.Paul Krugman and Robin Wells Krugman, Robin Wells (2006 ...
s. While
critical raw materials such as
rare earth mineral
A rare-earth mineral contains one or more rare-earth elements as major metal constituents. Rare-earth minerals are usually found in association with alkaline to peralkaline igneous magmas in pegmatites or with carbonatite intrusives. Perovs ...
s are an important focus of resource security planning, resource security covers a broader range of resources.
Food security
Food security is the state of having reliable access to a sufficient quantity of affordable, healthy Human food, food. The availability of food for people of any class, gender, ethnicity, or religion is another element of food protection. Simila ...
, ensuring that a reliable supply of, and access to, safe and
nutritious food, and
energy security
Energy security is the association between national security and the availability of natural resources for energy consumption (as opposed to household energy insecurity). Access to cheaper energy has become essential to the functioning of modern ...
are important aspects of resource security. Food security is gaining in importance as the world's population has grown and productive land has diminished through overuse and
climate change
Present-day climate change includes both global warming—the ongoing increase in Global surface temperature, global average temperature—and its wider effects on Earth's climate system. Climate variability and change, Climate change in ...
.
The
UK government
His Majesty's Government, abbreviated to HM Government or otherwise UK Government, is the central government, central executive authority of the United Kingdom of Great Britain and Northern Ireland. published a ''Resource Security Action Plan'' for England in March 2012, subtitled "Making the most of valuable resources", responding to concerns raised by businesses and business leaders such as the
Confederation of British Industry
The Confederation of British Industry (CBI) is a British business interest group, which says it represents 190,000 businesses. The CBI has been described by the ''Financial Times'' as "Britain's biggest business lobby group". Incorporated by roy ...
(CBI) and the
Engineering Employers' Federation (EEF), and work in this field undertaken by the
House of Commons Science and Technology Committee. The action plan was an interdepartmental initiative for which the
Department for Environment, Food and Rural Affairs
The Department for Environment, Food and Rural Affairs (Defra) is a Departments of the Government of the United Kingdom, ministerial department of the government of the United Kingdom. It is responsible for environmental quality, environmenta ...
(DEFRA) took the lead role as first point of contact for business enquiries.
[DEFRA and BIS]
Resource Security Action Plan: Making the most of valuable materials
published in March 2012, accessed on 5 February 2025
Government and business concerns related to "a range of renewable and non-renewable resources", concentrating on those not already covered by
energy security
Energy security is the association between national security and the availability of natural resources for energy consumption (as opposed to household energy insecurity). Access to cheaper energy has become essential to the functioning of modern ...
and
food security
Food security is the state of having reliable access to a sufficient quantity of affordable, healthy Human food, food. The availability of food for people of any class, gender, ethnicity, or religion is another element of food protection. Simila ...
measures, and especially sought to protect the supply of certain specific metals and materials under supply pressure. A generalised fear of resource insufficiency was felt to be inappropriate: thus
Vince Cable
Sir John Vincent Cable (born 9 May 1943) is a British politician who was Leader of the Liberal Democrats from 2017 to 2019. He was Member of Parliament (United Kingdom), Member of Parliament (MP) for Twickenham (UK Parliament constituency), Twic ...
, then
Secretary of State for Business Innovation and Skills, spoke in December 2011 about a public policy approach to resource management: Similarly the ''Action Plan'' notes that in general the issue of "resource security" is not concerned with "scarcity" of resources but with availability, supply constraints and the potential financial and environmental costs of opening up new sources of supply.
EEF, the UK's manufacturers' representation organisation (now
Make UK) issued a report in 2014 entitled ''Materials for Manufacturing: Safeguarding Supply'', along with an appeal to the government seeking action to protect the country's supply of essential materials. The report highlighted "over-reliance on
China
China, officially the People's Republic of China (PRC), is a country in East Asia. With population of China, a population exceeding 1.4 billion, it is the list of countries by population (United Nations), second-most populous country after ...
for strategic supplies" as a key issue. The EEF and other partners argued that an "Office of Resource Management" within government "could strategically co-ordinate action across Whitehall". The office would form part of the
Department for Business, Innovation and Skills
The Department for Business, Innovation and Skills (BIS) was a ministerial department of the Government of the United Kingdom. It was created by the Gordon Brown premiership on 5 June 2009 by the merger of the Department for Innovation, Uni ...
and maintain an overview of the risks to resource security.
Perceptions of security
Since it is not possible to know with precision the extent to which something is 'secure' (and a measure of vulnerability is unavoidable), perceptions of security vary, often greatly.
For example, a fear of death by earthquake is common in the United States (US), but slipping on the bathroom floor kills more people;
[Bruce Schneier, ''Beyond Fear: Thinking about Security in an Uncertain World'', Copernicus Books, pages 26–27] and in France, the United Kingdom, and the US, there are far fewer deaths caused by
terrorism
Terrorism, in its broadest sense, is the use of violence against non-combatants to achieve political or ideological aims. The term is used in this regard primarily to refer to intentional violence during peacetime or in the context of war aga ...
than there are women killed by their partners in the home.
Another problem of perception is the common assumption that the mere presence of a security system (such as
armed forces
A military, also known collectively as armed forces, is a heavily armed, highly organized force primarily intended for warfare. Militaries are typically authorized and maintained by a sovereign state, with their members identifiable by a ...
or
antivirus software
Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware.
Antivirus software was originally developed to detect and remove computer viruses, hence the name ...
) implies security. For example, two
computer security
Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and computer network, n ...
programs installed on the same device can prevent each other from working properly, while the user assumes that he or she benefits from twice the protection that only one program would afford.
Security theater is a critical term for measures that change perceptions of security without necessarily affecting security itself. For example, visual signs of security protections, such as a home that advertises its alarm system, may deter an
intruder, whether or not the system functions properly. Similarly, the
increased presence of military personnel on the streets of a city after a
terrorist attack
Terrorism, in its broadest sense, is the use of violence against non-combatants to achieve political or ideological aims. The term is used in this regard primarily to refer to intentional violence during peacetime or in the context of war a ...
may help to reassure the public, whether or not it diminishes the risk of further attacks.
Recurring concepts
Certain concepts recur throughout different fields of security:
*
Access control
In physical security and information security, access control (AC) is the action of deciding whether a subject should be granted or denied access to an object (for example, a place or a resource). The act of ''accessing'' may mean consuming ...
– the selective restriction of access to a place or other resource.
*
Assurance – an expression of confidence that a security measure will perform as expected.
*
Authorization
Authorization or authorisation (see American and British English spelling differences#-ise, -ize (-isation, -ization), spelling differences), in information security, computer security and identity management, IAM (Identity and Access Managemen ...
– the function of specifying access rights/privileges to resources related to information security and computer security in general and to access control in particular.
*
Cipher
In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is ''encipherment''. To encipher or encode i ...
– an algorithm that defines a set of steps to encrypt or decrypt information so that it is incomprehensible.
*
Countermeasure
A countermeasure is a measure or action taken to counter or offset another one. As a general concept, it implies precision and is any technological or tactical solution or system designed to prevent an undesirable outcome in the process. The fi ...
– a means of preventing an act or system from having its intended effect.
*
Defense in depth – a school of thought holding that a wider range of security measures will enhance security.
*
Exploit (noun) – a means of capitalizing on a vulnerability in a security system (usually a cyber-security system).
*
Identity management
Identity and access management (IAM or IdAM) or Identity management (IdM), is a framework of policies and technologies to ensure that the right users (that are part of the ecosystem connected to or within an enterprise) have the appropriate acce ...
– enables the right individuals to access the right resources at the right times and for the right reasons.
*
Password
A password, sometimes called a passcode, is secret data, typically a string of characters, usually used to confirm a user's identity. Traditionally, passwords were expected to be memorized, but the large number of password-protected services t ...
– secret data, typically a string of characters, usually used to confirm a user's identity.
*
Resilience – the degree to which a person, community, nation or system is able to resist adverse external forces.
*
Risk
In simple terms, risk is the possibility of something bad happening. Risk involves uncertainty about the effects/implications of an activity with respect to something that humans value (such as health, well-being, wealth, property or the environ ...
– a possible event which could lead to damage, harm, or loss.
*
Security management
Security management is the identification of an organization's assets i.e. including people, buildings, machines, systems and information assets, followed by the development, documentation, and implementation of policies and procedures for pr ...
– identification of an organization's assets (including people, buildings, machines, systems and information assets), followed by the development, documentation, and implementation of policies and procedures for protecting these assets.
*
Security seal
*
Threat
A threat is a communication of intent to inflict harm or loss on another person. Intimidation is a tactic used between conflicting parties to make the other timid or psychologically insecure for coercion or control. The act of intimidation f ...
– a potential source of harm.
*
Vulnerability
Vulnerability refers to "the quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally." The understanding of social and environmental vulnerability, as a methodological approach, involves ...
– the degree to which something may be changed (usually in an unwanted manner) by external forces.
See also
*
Peace
Peace is a state of harmony in the absence of hostility and violence, and everything that discusses achieving human welfare through justice and peaceful conditions. In a societal sense, peace is commonly used to mean a lack of conflict (suc ...
*
Safety
Safety is the state of being protected from harm or other danger. Safety can also refer to the control of recognized hazards in order to achieve an acceptable level of risk.
Meanings
The word 'safety' entered the English language in the 1 ...
*
Security increase
*
Security risk
*
Security convergence Security convergence refers to the convergence of two historically distinct security functions – physical security and information security – within enterprises; both are integral parts of a coherent risk management program. Security con ...
*
Gordon–Loeb model for cyber security investments
Notes
References
External links
*
{{Authority control
Prevention
Law enforcement