HOME

TheInfoList



OR:

Security is protection from, or resilience against, potential harm (or other unwanted
coercive Coercion () is compelling a party to act in an involuntary manner by the use of threats, including threats to use force against a party. It involves a set of forceful actions which violate the free will of an individual in order to induce a desi ...
change) caused by others, by restraining the freedom of others to act. Beneficiaries (technically
referent A referent () is a person or thing to which a name – a linguistic expression or other symbol – refers. For example, in the sentence ''Mary saw me'', the referent of the word ''Mary'' is the particular person called Mary who is being spoken of ...
s) of security may be of persons and social groups, objects and institutions, ecosystems or any other entity or phenomenon vulnerable to unwanted change. Security mostly refers to protection from hostile forces, but it has a wide range of other senses: for example, as the absence of harm (e.g.
freedom from want The right to an adequate standard of living is a fundamental human right. It is part of the Universal Declaration of Human Rights that was accepted by the General Assembly of the United Nations on December 10, 1948.United Nations''Universal Decl ...
); as the presence of an essential good (e.g.
food security Food security speaks to the availability of food in a country (or geography) and the ability of individuals within that country (geography) to access, afford, and source adequate foodstuffs. According to the United Nations' Committee on World F ...
); as resilience against potential damage or harm (e.g. secure foundations); as secrecy (e.g. a secure telephone line); as containment (e.g. a secure room or
cell Cell most often refers to: * Cell (biology), the functional basic unit of life Cell may also refer to: Locations * Monastic cell, a small room, hut, or cave in which a religious recluse lives, alternatively the small precursor of a monastery w ...
); and as a state of mind (e.g.
emotional security Emotional security is the measure of the stability of an individual's emotional state. Emotional insecurity or simply insecurity is a feeling of general unease or nervousness that may be triggered by perceiving of oneself to be vulnerable or i ...
). The term is also used to refer to acts and systems whose purpose may be to provide security (security companies, security forces,
security guard A security guard (also known as a security inspector, security officer, or protective agent) is a person employed by a government or private party to protect the employing party's assets (property, people, equipment, money, etc.) from a variety ...
, cyber security systems,
security cameras Closed-circuit television (CCTV), also known as video surveillance, is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in that the signal is not openly tr ...
,
remote guarding Remote guarding is a proactive security system combining CCTV video cameras, video analytics, alarms, monitoring centers and security agents. Potential threats are first spotted by cameras and analyzed in real-time by software algorithms based ...
). Security can be physical and virtual.


Etymology

The word 'secure' entered the English language in the 16th century. It is derived from Latin ''securus'', meaning freedom from anxiety: ''se'' (without) + ''cura'' (care, anxiety).


Overview


Referent

A security
referent A referent () is a person or thing to which a name – a linguistic expression or other symbol – refers. For example, in the sentence ''Mary saw me'', the referent of the word ''Mary'' is the particular person called Mary who is being spoken of ...
is the focus of a security policy or discourse; for example, a referent may be a potential beneficiary (or victim) of a security policy or system. Security referents may be persons or social groups, objects, institutions, ecosystems, or any other phenomenon vulnerable to unwanted change by the forces of its environment.Barry Buzan, Ole Wæver, and Jaap de Wilde, ''Security: A New Framework for Analysis'' (Boulder: Lynne Rienner Publishers, 1998), p. 32 The referent in question may combine many referents, in the same way that, for example, a nation state is composed of many individual citizens.


Context

The security context is the relationships between a security referent and its environment. From this perspective, security and insecurity depend first on whether the environment is beneficial or hostile to the referent, and also how capable is the referent of responding to its/their environment in order to survive and thrive.


Capabilities

The means by which a referent provides for security (or is provided for) vary widely. They include, for example: * ''Coercive capabilities'', including the capacity to project coercive power into the environment (e.g.
aircraft carrier An aircraft carrier is a warship that serves as a seagoing airbase, equipped with a full-length flight deck and facilities for Carrier-based aircraft, carrying, arming, deploying, and recovering aircraft. Typically, it is the capital ship of a ...
, handgun, firearms); * ''Protective systems'' (e.g.
lock Lock(s) may refer to: Common meanings *Lock and key, a mechanical device used to secure items of importance *Lock (water navigation), a device for boats to transit between different levels of water, as in a canal Arts and entertainment * ''Lock ...
,
fence A fence is a structure that encloses an area, typically outdoors, and is usually constructed from posts that are connected by boards, wire, rails or netting. A fence differs from a wall in not having a solid foundation along its whole length. ...
,
wall A wall is a structure and a surface that defines an area; carries a load; provides security, shelter, or soundproofing; or, is decorative. There are many kinds of walls, including: * Walls in buildings that form a fundamental part of the super ...
,
antivirus software Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses, hence the nam ...
,
air defence system Anti-aircraft warfare, counter-air or air defence forces is the battlespace response to aerial warfare, defined by NATO as "all measures designed to nullify or reduce the effectiveness of hostile air action".AAP-6 It includes surface based, ...
,
armour Armour (British English) or armor (American English; see spelling differences) is a covering used to protect an object, individual, or vehicle from physical injury or damage, especially direct contact weapons or projectiles during combat, or fr ...
) * ''Warning systems'' (e.g. alarm, radar) * ''Diplomatic and social action'' intended to prevent insecurity from developing (e.g. conflict prevention and transformation strategies); and * ''Policy'' intended to develop the lasting economic, physical, ecological and other conditions of security (e.g. economic reform, ecological protection, progressive demilitarization, militarization).


Effects

Any action intended to provide security may have multiple effects. For example, an action may have wide benefit, enhancing security for several or all security referents in the context; alternatively, the action may be effective only temporarily, or benefit one referent at the expense of another, or be entirely ineffective or counterproductive.


Contested approaches

Approaches to security are contested and the subject of debate. For example, in debate about national security strategies, some argue that security depends principally on developing protective and coercive capabilities in order to protect the security referent in a hostile environment (and potentially to project that power into its environment, and dominate it to the point of strategic supremacy). Others argue that security depends principally on building the conditions in which equitable relationships can develop, partly by reducing antagonism between actors, ensuring that fundamental needs can be met, and also that differences of interest can be negotiated effectively.


Contexts of security (examples)

The table shows some of the main domains where security concerns are prominent. IT realm *
Application security Application security (short AppSec) includes all tasks that introduce a secure software development life cycle to development teams. Its final goal is to improve security practices and, through that, to find, fix and preferably prevent security ...
* Communications security * Computer security * Data security * Digital security * Endpoint security *
Information security Information security, sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthoriz ...
* Internet security * Network security *
Usable Security Usability can be described as the capacity of a system to provide a condition for its users to perform the tasks safely, effectively, and efficiently while enjoying the experience. In software engineering, usability is the degree to which a soft ...
Physical realm *
Airport security Airport security includes the techniques and methods used in an attempt to protect passengers, staff, aircraft, and airport property from malicious harm, crime, terrorism, and other threats. Aviation security is a combination of measures and hum ...
* Corporate security *
Food security Food security speaks to the availability of food in a country (or geography) and the ability of individuals within that country (geography) to access, afford, and source adequate foodstuffs. According to the United Nations' Committee on World F ...
* Environmental security *
Home security Home security includes both the security hardware placed on a property and individuals' personal security practices. Security hardware includes doors, locks, alarm systems, lighting, motion detectors, and security camera systems. Personal sec ...
* Infrastructure security * Physical security * Port security/ Supply chain security *
Security bag A security bag is a heavy duty bag used to contain high-value products or documents or legally sensitive items. Envelopes with security features are called security envelopes as well as security bags. Cash for deposit in a bank is often place ...
*
Security print Security printing is the field of the printing industry that deals with the printing of items such as banknotes, cheques, passports, tamper-evident labels, security tapes, product authentication, stock certificates, postage stamps and identity ca ...
*
Border security Border control refers to measures taken by governments to monitor and regulate the movement of people, animals, and goods across land, air, and maritime borders. While border control is typically associated with international borders, it a ...
* Security seal Political * National security * Public security *
Homeland security Homeland security is an American national security term for "the national effort to ensure a homeland that is safe, secure, and resilient against terrorism and other hazards where American interests, aspirations, and ways of life can thrive" to ...
*
Internal security Internal security is the act of keeping peace within the borders of a sovereign state or other self-governing territories, generally by upholding the national law and defending against internal security threats. Responsibility for internal secur ...
* International security *
Human security Human security is a paradigm for understanding global vulnerabilities whose proponents challenges the traditional notion of national security through military security by arguing that the proper referent for security should be at the human rather t ...
Monetary * Economic security/financial security * Social security The range of security contexts is illustrated by the following examples (in alphabetical order):


Computer security

Computer security, also known as cybersecurity or IT security, refers to the security of computing devices such as computers and smartphones, as well as computer networks such as private and public networks, and the Internet. The field has growing importance due to the increasing reliance on computer systems in most societies. It concerns the protection of hardware, software, data, people, and also the procedures by which systems are accessed. The means of computer security include the physical security of systems and security of information held on them.


Corporate security

Corporate security refers to the resilience of corporations against espionage, theft, damage, and other threats. The security of corporations has become more complex as reliance on IT systems has increased, and their physical presence has become more highly distributed across several countries, including environments that are, or may rapidly become, hostile to them.


Ecological security

Ecological security, also known as environmental security, refers to the integrity of ecosystems and the
biosphere The biosphere (from Greek βίος ''bíos'' "life" and σφαῖρα ''sphaira'' "sphere"), also known as the ecosphere (from Greek οἶκος ''oîkos'' "environment" and σφαῖρα), is the worldwide sum of all ecosystems. It can also be ...
, particularly in relation to their capacity to sustain a diversity of life-forms (including human life). The security of ecosystems has attracted greater attention as the impact of ecological damage by humans has grown.


Food security

Food security refers to the ready supply of, and access to, safe and
nutritious Nutrition is the biochemical and physiological process by which an organism uses food to support its life. It provides organisms with nutrients, which can be metabolized to create energy and chemical structures. Failure to obtain sufficient nu ...
food. Food security is gaining in importance as the world's population has grown and productive land has diminished through overuse and climate change.


Home security

Home security normally refers to the security systems used on a property used as a dwelling (commonly including doors, locks, alarm systems, lighting, fencing); and personal security practices (such as ensuring doors are locked, alarms activated, windows closed etc.)


Human security

Human security is an emerging paradigm which, in response to traditional emphasis on the right of nation states to protect themselves, has focused on the primacy of the security of people (individuals and communities). The concept is supported by the United Nations General Assembly, which has stressed "the right of people to live in
freedom Freedom is understood as either having the ability to act or change without constraint or to possess the power and resources to fulfill one's purposes unhindered. Freedom is often associated with liberty and autonomy in the sense of "giving on ...
and dignity" and recognized "that all individuals, in particular vulnerable people, are entitled to
freedom from fear Freedom from fear is listed as a fundamental human right according to The Universal Declaration of Human Rights. On January 6, 1941, United States President Franklin D. Roosevelt called it one of the "Four Freedoms" at his State of the Union, wh ...
and
freedom from want The right to an adequate standard of living is a fundamental human right. It is part of the Universal Declaration of Human Rights that was accepted by the General Assembly of the United Nations on December 10, 1948.United Nations''Universal Decl ...
".


National security

National security refers to the security of a
nation state A nation state is a political unit where the state and nation are congruent. It is a more precise concept than "country", since a country does not need to have a predominant ethnic group. A nation, in the sense of a common ethnicity, may inc ...
, including its people, economy, and institutions. In practice, state governments rely on a wide range of means, including
diplomacy Diplomacy comprises spoken or written communication by representatives of states (such as leaders and diplomats) intended to influence events in the international system.Ronald Peter Barston, ''Modern diplomacy'', Pearson Education, 2006, p. 1 ...
, economic power, and
military capabilities This is a list of countries by level of military equipment, including naval ships, fighter aircraft and nuclear weapons. This list is indicative only, as strict comparisons cannot accurately be made. List States marked 'TC' are widely consid ...
.


Perceptions of security

Since it is not possible to know with precision the extent to which something is 'secure' (and a measure of vulnerability is unavoidable), perceptions of security vary, often greatly. For example, a fear of death by earthquake is common in the United States (US), but slipping on the bathroom floor kills more people;Bruce Schneier, ''Beyond Fear: Thinking about Security in an Uncertain World'', Copernicus Books, pages 26–27 and in France, the United Kingdom and the US there are far fewer deaths caused by terrorism than there are women killed by their partners in the home. Another problem of perception is the common assumption that the mere presence of a security system (such as
armed forces A military, also known collectively as armed forces, is a heavily armed, highly organized force primarily intended for warfare. It is typically authorized and maintained by a sovereign state, with its members identifiable by their distinct ...
, or
antivirus software Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses, hence the nam ...
) implies security. For example, two computer security programs installed on the same device can prevent each other from working properly, while the user assumes that he or she benefits from twice the protection that only one program would afford. Security theater is a critical term for measures that change perceptions of security without necessarily affecting security itself. For example, visual signs of security protections, such as a home that advertises its alarm system, may deter an intruder, whether or not the system functions properly. Similarly, the increased presence of military personnel on the streets of a city after a terrorist attack may help to reassure the public, whether or not it diminishes the risk of further attacks.


Security concepts (examples)

Certain concepts recur throughout different fields of security: *
Access control In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource, while access management describes the process. The act of ''accessing'' may mean consuming ...
– the selective restriction of access to a place or other resource. * Assurance – an expression of confidence that a security measure will perform as expected. *
Authorization Authorization or authorisation (see spelling differences) is the function of specifying access rights/privileges to resources, which is related to general information security and computer security, and to access control in particular. More for ...
– the function of specifying access rights/privileges to resources related to information security and computer security in general and to access control in particular. *
Cipher In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is ''encipherment''. To encipher or encode i ...
– an algorithm that defines a set of steps to encrypt or decrypt information so that it is incomprehensible. *
Countermeasure A countermeasure is a measure or action taken to counter or offset another one. As a general concept, it implies precision and is any technological or tactical solution or system designed to prevent an undesirable outcome in the process. The fi ...
– a means of preventing an act or system from having its intended effect. * Defense in depth – a school of thought holding that a wider range of security measures will enhance security. * Exploit (noun) – a means of capitalizing on a vulnerability in a security system (usually a cyber-security system). * Identity management – enables the right individuals to access the right resources at the right times and for the right reasons. *
Password A password, sometimes called a passcode (for example in Apple devices), is secret data, typically a string of characters, usually used to confirm a user's identity. Traditionally, passwords were expected to be memorized, but the large number of ...
– secret data, typically a string of characters, usually used to confirm a user's identity. * Resilience – the degree to which a person, community, nation or system is able to resist adverse external forces. * Risk – a possible event which could lead to damage, harm, or loss. *
Security management Security management is the identification of an organization's assets (including people, buildings, machines, systems and information assets), followed by the development, documentation, and implementation of policies and procedures for protec ...
– identification of an organization's assets (including people, buildings, machines, systems and information assets), followed by the development, documentation, and implementation of policies and procedures for protecting these assets. * Threat – a potential source of harm. * Vulnerability – the degree to which something may be changed (usually in an unwanted manner) by external forces.


See also

* Peace * Safety *
Security increase A security increase often occurs when a nation, state, or institution has recently suffered from a serious incident or is under the perception that there is an increased risk for an incident to occur that endangers or potentially endangers its well ...
* Security risk *
Security convergence Security convergence refers to the convergence of two historically distinct security functions – physical security and information security – within enterprises; both are integral parts of a coherent risk management program. Security co ...


References


External links

* {{Authority control Prevention Law enforcement