Security Forces Headquarters - East
   HOME

TheInfoList



OR:

Security is protection from, or resilience against,
potential Potential generally refers to a currently unrealized ability. The term is used in a wide variety of fields, from physics to the social sciences to indicate things that are in a state where they are able to change in ways ranging from the simple r ...
harm (or other unwanted
coercion Coercion involves compelling a party to act in an involuntary manner through the use of threats, including threats to use force against that party. It involves a set of forceful actions which violate the free will of an individual in order to i ...
).
Beneficiaries A beneficiary in the broadest sense is a natural person or other legal entity who receives money or other benefits from a benefactor. For example, the beneficiary of a life insurance policy is the person who receives the payment of the amount of ...
(technically
referent A referent ( ) is a person or thing to which a name – a linguistic expression or other symbol – refers. For example, in the sentence ''Mary saw me'', the referent of the word ''Mary'' is the particular person called Mary who is being spoken o ...
s) of security may be persons and social groups, objects and institutions, ecosystems, or any other entity or phenomenon vulnerable to unwanted change. Security mostly refers to protection from hostile forces, but it has a wide range of other senses: for example, as the absence of harm (e.g.,
freedom from want The right to an adequate standard of living is listed as part of the Universal Declaration of Human Rights that was accepted by the General Assembly of the United Nations on December 10, 1948.United Nations''Universal Declaration of Human Right ...
); as the presence of an essential good (e.g.,
food security Food security is the state of having reliable access to a sufficient quantity of affordable, healthy Human food, food. The availability of food for people of any class, gender, ethnicity, or religion is another element of food protection. Simila ...
); as
resilience Resilience, resilient, or resiliency may refer to: Science Ecology * Ecological resilience, the capacity of an ecosystem to recover from perturbations ** Climate resilience, the ability of systems to recover from climate change ** Soil resilien ...
against potential damage or harm (e.g. secure foundations); as secrecy (e.g., a secure telephone line); as containment (e.g., a secure room or
cell Cell most often refers to: * Cell (biology), the functional basic unit of life * Cellphone, a phone connected to a cellular network * Clandestine cell, a penetration-resistant form of a secret or outlawed organization * Electrochemical cell, a de ...
); and as a state of mind (e.g.,
emotional security Insecurity is the emotion associated with a lack of confidence within oneself. It is often associated with feelings of fear and uncertainty, especially surrounding one's abilities. The word was originally used in the psychological sense in the yea ...
). Security is both a feeling and a state of reality. One might feel secure when one is not actually so; or might feel insecure despite being safe. This distinction is usually not very clear to express in the English language. The term is also used to refer to acts and systems whose purpose may be to provide security (
security company A private security company is a business entity which provides armed or unarmed security services and expertise to clients in the private or public sectors. Overview Private security companies are defined by the U.S. Bureau of Labor Statistic ...
,
security police Security police usually describes a law enforcement agency which focuses primarily on providing security and law enforcement services to particular areas or specific properties. They may be employed by governmental, public, or private institutio ...
,
security forces Security forces are statutory organizations with internal security mandates. In the legal context of several countries, the term has variously denoted police and military units working in concert, or the role of irregular military and paramilitar ...
, security service,
security agency A security agency is a governmental organization that conducts intelligence activities for the internal security of a state. They are the domestic cousins of foreign intelligence agencies, and typically conduct counterintelligence to thwart other ...
,
security guard A security guard (also known as a security inspector, security officer, factory guard, or protective agent) is a person employed by a government or private party to protect the employing party's assets (property, people, equipment, money, etc.) ...
, cyber security systems,
security cameras Closed-circuit television (CCTV), also known as video surveillance, is the use of closed-circuit television cameras to transmit a signal to a specific place on a limited set of monitors. It differs from broadcast television in that the signal ...
,
remote guarding Remote guarding is a proactive security system combining CCTV video cameras, video analytics, alarms, monitoring centers and security agents. Potential threats are first spotted by cameras and analyzed in real-time by software algorithms based ...
). Security can be physical and virtual.


Etymology

The word 'secure' entered the English language in the 16th century. It is derived from Latin ''securus'', meaning freedom from anxiety: ''se'' (without) + ''cura'' (care, anxiety).


Overview


Referent

A security
referent A referent ( ) is a person or thing to which a name – a linguistic expression or other symbol – refers. For example, in the sentence ''Mary saw me'', the referent of the word ''Mary'' is the particular person called Mary who is being spoken o ...
is the focus of a security policy or discourse; for example, a referent may be a potential beneficiary (or victim) of a security policy or system. Security referents may be persons or social groups, objects, institutions, ecosystems, or any other phenomenon vulnerable to unwanted change by the forces of its environment.Barry Buzan, Ole Wæver, and Jaap de Wilde, ''Security: A New Framework for Analysis'' (Boulder: Lynne Rienner Publishers, 1998), p. 32 The referent in question may combine many referents in the same way that, for example, a nation-state is composed of many individual citizens.


Context

The security context is the relationships between a security referent and its environment. From this perspective, security and insecurity depend first on whether the environment is beneficial or hostile to the referent and also on how capable the referent is of responding to their environment in order to survive and thrive.


Capabilities

The means by which a referent provides for security (or is provided for) vary widely. They include, for example: * ''Coercive capabilities'', including the capacity to project coercive power into the environment (e.g.,
aircraft carriers An aircraft carrier is a warship that serves as a seagoing airbase, equipped with a full-length flight deck and hangar facilities for supporting, arming, deploying and recovering shipborne aircraft. Typically it is the capital ship of a fl ...
,
handguns A handgun is a firearm designed to be usable with only one hand. It is distinguished from a long barreled gun (i.e., carbine, rifle, shotgun, submachine gun, or machine gun) which typically is intended to be held by both hands and braced aga ...
,
firearms A firearm is any type of gun that uses an explosive charge and is designed to be readily carried and operated by an individual. The term is legally defined further in different countries (see legal definitions). The first firearms originated ...
); * ''Protective systems'' (e.g.,
lock Lock(s) or Locked may refer to: Common meanings *Lock and key, a mechanical device used to secure items of importance *Lock (water navigation), a device for boats to transit between different levels of water, as in a canal Arts and entertainme ...
,
fence A fence is a structure that encloses an area, typically outdoors, and is usually constructed from posts that are connected by boards, wire, rails or net (textile), netting. A fence differs from a wall in not having a solid foundation along its ...
,
wall A wall is a structure and a surface that defines an area; carries a load; provides security, shelter, or soundproofing; or serves a decorative purpose. There are various types of walls, including border barriers between countries, brick wal ...
,
antivirus software Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses, hence the name ...
,
air defence system Anti-aircraft warfare (AAW) is the counter to aerial warfare and includes "all measures designed to nullify or reduce the effectiveness of hostile air action".AAP-6 It encompasses surface-based, subsurface (Submarine#Armament, submarine-lau ...
,
armour Armour (Commonwealth English) or armor (American English; see American and British English spelling differences#-our, -or, spelling differences) is a covering used to protect an object, individual, or vehicle from physical injury or damage, e ...
) * ''Warning systems'' (e.g., alarm,
radar Radar is a system that uses radio waves to determine the distance ('' ranging''), direction ( azimuth and elevation angles), and radial velocity of objects relative to the site. It is a radiodetermination method used to detect and track ...
) * ''Diplomatic and social action'' intended to prevent insecurity from developing (e.g. conflict prevention and transformation strategies); and * ''Policy'' intended to develop the lasting economic, physical, ecological, and other conditions of security (e.g.,
economic An economy is an area of the Production (economics), production, Distribution (economics), distribution and trade, as well as Consumption (economics), consumption of Goods (economics), goods and Service (economics), services. In general, it is ...
reform,
ecological Ecology () is the natural science of the relationships among living organisms and their environment. Ecology considers organisms at the individual, population, community, ecosystem, and biosphere levels. Ecology overlaps with the closely re ...
protection, Demilitarisation, progressive demilitarization, militarization).


Effects

Any action intended to provide security may have multiple effects. An action may have a wide benefit, enhancing security for several or all security referents in the context; alternatively, the action may be effective only temporarily, benefit one referent at the expense of another, or be entirely ineffective or counterproductive.


Contested approaches

Approaches to security are contested and the subject of debate. For example, in debate about National security, national security strategies, some argue that security depends principally on developing protective and coercive capabilities in order to protect the security referent in a hostile environment (and potentially to project that power into its environment, and dominate it to the point of Full-spectrum dominance, strategic supremacy). Others argue that security depends principally on building the conditions in which equitable relationships can develop, partly by reducing antagonism between actors, ensuring that fundamental needs can be met, and also ensuring that differences of interest can be negotiated effectively.


Security contexts (examples)

The table shows some of the main domains where security concerns are prominent. Informational * Application security * Communications security * Computer security * Data security * Digital security * Endpoint security * Information security * Internet security * Network security * Usable security Physical * Airport security * Corporate security * Food security *Energy security * Environmental security * Home security * Infrastructure security * Physical security * Port security/Supply chain security * Security bag * Security print * Border control, Border security * Security seal Political * National security * Public security * Homeland security * Internal security * International security * Human security * Societal security Monetary * Economic security * Social security The range of security contexts is illustrated by the following examples (in alphabetical order):


Computer security

Computer security, also known as cybersecurity or IT security, refers to the security of computing devices such as computers and smartphones, as well as computer networks such as private and public networks, and the Internet access, Internet. The field has growing importance due to the increasing reliance on computer systems in most societies. It concerns the protection of hardware, software, data, people, and also the procedures by which systems are accessed. The means of computer security include the physical security of systems and the information security, security of information held on them.


Corporate security

Corporate security refers to the resilience of corporations against espionage, theft, damage, and other threats. The security of corporations has become more complex as reliance on IT systems has increased, and their physical presence has become more highly distributed across several countries, including environments that are, or may rapidly become, hostile to them.


Environmental security

Environmental security, also known as ecological security, refers to the integrity of ecosystems and the biosphere, particularly in relation to their capacity to sustain a Biodiversity, diversity of life-forms (including human life). The security of ecosystems has attracted greater attention as the impact of ecological damage by humans has grown.


Home security

Home security normally refers to the security systems used on a property used as a dwelling (commonly including doors, locks, alarm systems, lighting, fencing); and personal security practices (such as ensuring doors are locked, alarms are activated, windows are closed etc.)


Human security

Human security is an emerging paradigm that, in response to traditional emphasis on the right of nation-states to protect themselves, has focused on the primacy of the security of people (individuals and communities). The concept is supported by the United Nations General Assembly, which has stressed "the right of people to live in freedom and dignity" and recognized "that all individuals, in particular vulnerable people, are entitled to freedom from fear and
freedom from want The right to an adequate standard of living is listed as part of the Universal Declaration of Human Rights that was accepted by the General Assembly of the United Nations on December 10, 1948.United Nations''Universal Declaration of Human Right ...
".


Information security

Information security refers to the security of information in any form. Spoken, written, digital, networked, technological, and procedural forms of information are all examples that may be covered in an information security management scheme. Computer security, IT security, information and communications technology, ICT security, and network security are thus all subdomains of information security.


National security

National security refers to the security of a nation state, nation-state, including its people, economy, and institutions. In practice, state governments rely on a wide range of means, including diplomacy, economic power, and Military, military capabilities.


Resource security

"Resource security" refers to the political and commerce, commercial objective of ensuring that supplies of materials needed for the production of goods and the satisfaction of human needs can be reliably sustained into the future. It involves protecting the supply of such resources as water, energy, food and industrial raw materials from risks of resource depletion, global depletion and risks to national supply incurred by trade restrictions, government or terrorist interference or market failures. While critical raw materials such as Rare-earth mineral, rare earth minerals are an important focus of resource security planning, resource security covers a broader range of resources. Food security, ensuring that a reliable supply of, and access to, safe and Nutrition, nutritious food, and energy security are important aspects of resource security. Food security is gaining in importance as the world's population has grown and productive land has diminished through overuse and climate change. The UK government published a ''Resource Security Action Plan'' for England in March 2012, subtitled "Making the most of valuable resources", responding to concerns raised by businesses and business leaders such as the Confederation of British Industry (CBI) and the Engineering Employers' Federation (EEF), and work in this field undertaken by the House of Commons Science and Technology Committee. The action plan was an interdepartmental initiative for which the Department for Environment, Food and Rural Affairs (DEFRA) took the lead role as first point of contact for business enquiries.DEFRA and BIS
Resource Security Action Plan: Making the most of valuable materials
published in March 2012, accessed on 5 February 2025
Government and business concerns related to "a range of renewable and non-renewable resources", concentrating on those not already covered by energy security and
food security Food security is the state of having reliable access to a sufficient quantity of affordable, healthy Human food, food. The availability of food for people of any class, gender, ethnicity, or religion is another element of food protection. Simila ...
measures, and especially sought to protect the supply of certain specific metals and materials under supply pressure. A generalised fear of resource insufficiency was felt to be inappropriate: thus Vince Cable, then Secretary of State for Business Innovation and Skills, spoke in December 2011 about a public policy approach to resource management: Similarly the ''Action Plan'' notes that in general the issue of "resource security" is not concerned with "scarcity" of resources but with availability, supply constraints and the potential financial and environmental costs of opening up new sources of supply. EEF, the UK's manufacturers' representation organisation (now Make UK) issued a report in 2014 entitled ''Materials for Manufacturing: Safeguarding Supply'', along with an appeal to the government seeking action to protect the country's supply of essential materials. The report highlighted "over-reliance on China for strategic supplies" as a key issue. The EEF and other partners argued that an "Office of Resource Management" within government "could strategically co-ordinate action across Whitehall". The office would form part of the Department for Business, Innovation and Skills and maintain an overview of the risks to resource security.


Perceptions of security

Since it is not possible to know with precision the extent to which something is 'secure' (and a measure of vulnerability is unavoidable), perceptions of security vary, often greatly. For example, a fear of death by earthquake is common in the United States (US), but slipping on the bathroom floor kills more people;Bruce Schneier, ''Beyond Fear: Thinking about Security in an Uncertain World'', Copernicus Books, pages 26–27 and in France, the United Kingdom, and the US, there are far fewer deaths caused by terrorism than there are women killed by their partners in the home. Another problem of perception is the common assumption that the mere presence of a security system (such as Military, armed forces or
antivirus software Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses, hence the name ...
) implies security. For example, two computer security programs installed on the same device can prevent each other from working properly, while the user assumes that he or she benefits from twice the protection that only one program would afford. Security theater is a critical term for measures that change perceptions of security without necessarily affecting security itself. For example, visual signs of security protections, such as a home that advertises its alarm system, may deter an Trespasser, intruder, whether or not the system functions properly. Similarly, the Security increase, increased presence of military personnel on the streets of a city after a Terrorism, terrorist attack may help to reassure the public, whether or not it diminishes the risk of further attacks.


Recurring concepts

Certain concepts recur throughout different fields of security: * Access control – the selective restriction of access to a place or other resource. * Assurance services, Assurance – an expression of confidence that a security measure will perform as expected. * Authorization – the function of specifying access rights/privileges to resources related to information security and computer security in general and to access control in particular. * Cipher – an algorithm that defines a set of steps to encrypt or decrypt information so that it is incomprehensible. * Countermeasure – a means of preventing an act or system from having its intended effect. * Defense in depth – a school of thought holding that a wider range of security measures will enhance security. * Exploit (computer security), Exploit (noun) – a means of capitalizing on a vulnerability in a security system (usually a cyber-security system). * Identity management – enables the right individuals to access the right resources at the right times and for the right reasons. * Password – secret data, typically a string of characters, usually used to confirm a user's identity. * Resilience (organizational), Resilience – the degree to which a person, community, nation or system is able to resist adverse external forces. * Risk – a possible event which could lead to damage, harm, or loss. * Security management – identification of an organization's assets (including people, buildings, machines, systems and information assets), followed by the development, documentation, and implementation of policies and procedures for protecting these assets. * Security seal * Threat – a potential source of harm. * Vulnerability – the degree to which something may be changed (usually in an unwanted manner) by external forces.


See also

* Peace * Safety * Security increase * Security risk *Security convergence * Gordon–Loeb model for cyber security investments


Notes


References


External links

* {{Authority control Security, Prevention Law enforcement