HOME

TheInfoList



OR:

Security is protection from, or resilience against,
potential Potential generally refers to a currently unrealized ability. The term is used in a wide variety of fields, from physics to the social sciences to indicate things that are in a state where they are able to change in ways ranging from the simple r ...
harm (or other unwanted
coercive Coercion () is compelling a party to act in an involuntary manner by the use of threats, including threats to use force against a party. It involves a set of forceful actions which violate the free will of an individual in order to induce a desi ...
change) caused by others, by restraining the freedom of others to act. Beneficiaries (technically referents) of security may be of persons and social groups, objects and institutions, ecosystems or any other entity or phenomenon vulnerable to unwanted change. Security mostly refers to protection from hostile forces, but it has a wide range of other senses: for example, as the absence of harm (e.g. freedom from want); as the presence of an essential good (e.g.
food security Food security speaks to the availability of food in a country (or geography) and the ability of individuals within that country (geography) to access, afford, and source adequate foodstuffs. According to the United Nations' Committee on World F ...
); as resilience against potential damage or harm (e.g. secure foundations); as secrecy (e.g. a secure telephone line); as containment (e.g. a secure room or
cell Cell most often refers to: * Cell (biology), the functional basic unit of life Cell may also refer to: Locations * Monastic cell, a small room, hut, or cave in which a religious recluse lives, alternatively the small precursor of a monastery ...
); and as a state of mind (e.g. emotional security). The term is also used to refer to acts and systems whose purpose may be to provide security (security companies,
security forces Security forces are statutory organizations with internal security mandates. In the legal context of several nations, the term has variously denoted police and military units working in concert, or the role of military and paramilitary forces (su ...
,
security guard A security guard (also known as a security inspector, security officer, or protective agent) is a person employed by a government or private party to protect the employing party's assets (property, people, equipment, money, etc.) from a variety ...
, cyber security systems,
security cameras Closed-circuit television (CCTV), also known as video surveillance, is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in that the signal is not openly t ...
,
remote guarding Remote guarding is a proactive security system combining CCTV video cameras, video analytics, alarms, monitoring centers and security agents. Potential threats are first spotted by cameras and analyzed in real-time by software algorithms based ...
). Security can be
physical Physical may refer to: *Physical examination In a physical examination, medical examination, or clinical examination, a medical practitioner examines a patient for any possible medical signs or symptoms of a medical condition. It generally co ...
and virtual.


Etymology

The word 'secure' entered the English language in the 16th century. It is derived from Latin ''securus'', meaning freedom from anxiety: ''se'' (without) + ''cura'' (care, anxiety).


Overview


Referent

A security referent is the focus of a security policy or discourse; for example, a referent may be a potential beneficiary (or victim) of a security policy or system. Security referents may be persons or social groups, objects, institutions, ecosystems, or any other phenomenon vulnerable to unwanted change by the forces of its environment.Barry Buzan, Ole Wæver, and Jaap de Wilde, ''Security: A New Framework for Analysis'' (Boulder: Lynne Rienner Publishers, 1998), p. 32 The referent in question may combine many referents, in the same way that, for example, a nation state is composed of many individual citizens.


Context

The security context is the relationships between a security referent and its environment. From this perspective, security and insecurity depend first on whether the environment is beneficial or hostile to the referent, and also how capable is the referent of responding to its/their environment in order to survive and thrive.


Capabilities

The means by which a referent provides for security (or is provided for) vary widely. They include, for example: * ''Coercive capabilities'', including the capacity to project coercive power into the environment (e.g.
aircraft carrier An aircraft carrier is a warship that serves as a seagoing airbase, equipped with a full-length flight deck and facilities for carrying, arming, deploying, and recovering aircraft. Typically, it is the capital ship of a fleet, as it allows a ...
,
handgun A handgun is a short- barrelled gun, typically a firearm, that is designed to be usable with only one hand. It is distinguished from a long gun (i.e. rifle, shotgun or machine gun, etc.), which needs to be held by both hands and also braced ...
, firearms); * ''Protective systems'' (e.g.
lock Lock(s) may refer to: Common meanings *Lock and key, a mechanical device used to secure items of importance *Lock (water navigation), a device for boats to transit between different levels of water, as in a canal Arts and entertainment * ''Lock ...
,
fence A fence is a structure that encloses an area, typically outdoors, and is usually constructed from posts that are connected by boards, wire, rails or netting. A fence differs from a wall in not having a solid foundation along its whole length. ...
,
wall A wall is a structure and a surface that defines an area; carries a load; provides security, shelter, or soundproofing; or, is decorative. There are many kinds of walls, including: * Walls in buildings that form a fundamental part of the supe ...
,
antivirus software Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses, hence the name. ...
,
air defence system Anti-aircraft warfare, counter-air or air defence forces is the battlespace response to aerial warfare, defined by NATO as "all measures designed to nullify or reduce the effectiveness of hostile air action".AAP-6 It includes surface based, ...
, armour) * ''Warning systems'' (e.g. alarm,
radar Radar is a detection system that uses radio waves to determine the distance (''ranging''), angle, and radial velocity of objects relative to the site. It can be used to detect aircraft, ships, spacecraft, guided missiles, motor vehicles, w ...
) * ''Diplomatic and social action'' intended to prevent insecurity from developing (e.g. conflict prevention and transformation strategies); and * ''Policy'' intended to develop the lasting economic, physical, ecological and other conditions of security (e.g.
economic An economy is an area of the production, distribution and trade, as well as consumption of goods and services. In general, it is defined as a social domain that emphasize the practices, discourses, and material expressions associated with the ...
reform,
ecological Ecology () is the study of the relationships between living organisms, including humans, and their physical environment. Ecology considers organisms at the individual, population, community, ecosystem, and biosphere level. Ecology overlaps wi ...
protection, progressive demilitarization,
militarization Militarization, or militarisation, is the process by which a society organizes itself for military conflict and violence. It is related to militarism, which is an ideology that reflects the level of militarization of a state. The process of milit ...
).


Effects

Any action intended to provide security may have multiple effects. For example, an action may have wide benefit, enhancing security for several or all security referents in the context; alternatively, the action may be effective only temporarily, or benefit one referent at the expense of another, or be entirely ineffective or counterproductive.


Contested approaches

Approaches to security are contested and the subject of debate. For example, in debate about national security strategies, some argue that security depends principally on developing protective and coercive capabilities in order to protect the security referent in a hostile environment (and potentially to project that power into its environment, and dominate it to the point of strategic supremacy). Others argue that security depends principally on building the conditions in which equitable relationships can develop, partly by reducing antagonism between actors, ensuring that fundamental needs can be met, and also that differences of interest can be negotiated effectively.


Contexts of security (examples)

The table shows some of the main domains where security concerns are prominent. IT realm *
Application security Application security (short AppSec) includes all tasks that introduce a secure software development life cycle to development teams. Its final goal is to improve security practices and, through that, to find, fix and preferably prevent security ...
* Communications security *
Computer security Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, t ...
*
Data security Data security means protecting digital data, such as those in a database, from destructive forces and from the unwanted actions of unauthorized users, such as a cyberattack or a data breach. Technologies Disk encryption Disk encryption refe ...
*
Digital security Digital security refers to various ways of protecting a computer's internet account and files from intrusion by an outside user or a hacker. Computers and the Internet Internet security involves the protection of a computer's internet account a ...
*
Endpoint security Endpoint security or endpoint protection is an approach to the protection of computer networks that are remotely bridged to client devices. The connection of endpoint devices such as laptops, tablets, mobile phones, Internet-of-things devices ...
*
Information security Information security, sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorize ...
*
Internet security Internet security is a branch of computer security. It encompasses the Internet, browser security, web site security, and network security as it applies to other applications or operating systems as a whole. Its objective is to establish rules ...
*
Network security Network security consists of the policies, processes and practices adopted to prevent, detect and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves th ...
*
Usable Security Usability can be described as the capacity of a system to provide a condition for its users to perform the tasks safely, effectively, and efficiently while enjoying the experience. In software engineering, usability is the degree to which a soft ...
Physical realm *
Airport security Airport security includes the techniques and methods used in an attempt to protect passengers, staff, aircraft, and airport property from malicious harm, crime, terrorism, and other threats. Aviation security is a combination of measures and hum ...
* Corporate security *
Food security Food security speaks to the availability of food in a country (or geography) and the ability of individuals within that country (geography) to access, afford, and source adequate foodstuffs. According to the United Nations' Committee on World F ...
*
Environmental security Environmental security examines threats posed by environmental events and trends to individuals, communities or nations. It may focus on the impact of human conflict and international relations on the environment, or on how environmental problems c ...
*
Home security Home security includes both the security hardware placed on a property and individuals' personal security practices. Security hardware includes doors, locks, alarm systems, lighting, motion detectors, and security camera systems. Personal se ...
*
Infrastructure security Infrastructure security is the security provided to protect infrastructure, especially critical infrastructure, such as airports, highways rail transport, hospitals, bridges, transport hubs, network communications, media, the electricity grid, dam ...
*
Physical security Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment and resources and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks). Physica ...
*
Port security Port security is part of a broader definition concerning maritime security. It refers to the defense, law and treaty enforcement, and counterterrorism activities that fall within the port and maritime domain. It includes the protection of the se ...
/ Supply chain security *
Security bag A security bag is a heavy duty bag used to contain high-value products or documents or legally sensitive items. Envelopes with security features are called security envelopes as well as security bags. Cash for deposit in a bank is often place ...
*
Security print Security printing is the field of the printing industry that deals with the printing of items such as banknotes, cheques, passports, tamper-evident labels, security tapes, product authentication, stock certificates, postage stamps and identity c ...
*
Border security Border control refers to measures taken by governments to monitor and regulate the movement of people, animals, and goods across land, air, and maritime borders. While border control is typically associated with international borders, it a ...
*
Security seal Security seals are tamper-evident mechanisms that seal valuable material in a room, cabinet, vehicle, or other storage facility. One common use is to seal cargo in transit shipping containers in a way that provides tamper evidence and some lev ...
Political *
National security National security, or national defence, is the security and defence of a sovereign state, including its citizens, economy, and institutions, which is regarded as a duty of government. Originally conceived as protection against military atta ...
*
Public security Public security or public safety is the prevention of and protection from events that could endanger the safety and security of the public from significant danger, injury, or property damage. It is often conducted by a state government to ensur ...
*
Homeland security Homeland security is an American national security term for "the national effort to ensure a homeland that is safe, secure, and resilient against terrorism and other hazards where American interests, aspirations, and ways of life can thrive" t ...
*
Internal security Internal security is the act of keeping peace within the borders of a sovereign state or other self-governing territories, generally by upholding the national law and defending against internal security threats. Responsibility for internal secu ...
*
International security International security, also called global security is a term which refers to the measures taken by states and international organizations, such as the United Nations, European Union, and others, to ensure mutual survival and safety. These meas ...
*
Human security Human security is a paradigm for understanding global vulnerabilities whose proponents challenges the traditional notion of national security through military security by arguing that the proper referent for security should be at the human rather th ...
Monetary *
Economic security Economic security or financial security is the condition of having stable income or other resources to support a standard of living now and in the foreseeable future. It includes: * probable continued solvency * predictability of the future cash ...
/financial security *
Social security Welfare, or commonly social welfare, is a type of government support intended to ensure that members of a society can meet basic human needs such as food and shelter. Social security may either be synonymous with welfare, or refer specificall ...
The range of security contexts is illustrated by the following examples (in alphabetical order):


Computer security

Computer security Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, t ...
, also known as cybersecurity or IT security, refers to the security of computing devices such as
computer A computer is a machine that can be programmed to Execution (computing), carry out sequences of arithmetic or logical operations (computation) automatically. Modern digital electronic computers can perform generic sets of operations known as C ...
s and smartphones, as well as
computer network A computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other. These interconnections are ...
s such as private and public networks, and the
Internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
. The field has growing importance due to the increasing reliance on computer systems in most societies. It concerns the protection of hardware, software, data, people, and also the procedures by which systems are accessed. The means of computer security include the
physical security Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment and resources and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks). Physica ...
of systems and security of information held on them.


Corporate security

Corporate security refers to the resilience of
corporation A corporation is an organization—usually a group of people or a company—authorized by the state to act as a single entity (a legal entity recognized by private and public law "born out of statute"; a legal person in legal context) and r ...
s against
espionage Espionage, spying, or intelligence gathering is the act of obtaining secret or confidential information (intelligence) from non-disclosed sources or divulging of the same without the permission of the holder of the information for a tangib ...
, theft, damage, and other threats. The security of corporations has become more complex as reliance on IT systems has increased, and their physical presence has become more highly distributed across several countries, including environments that are, or may rapidly become, hostile to them.


Ecological security

Ecological security, also known as environmental security, refers to the integrity of
ecosystem An ecosystem (or ecological system) consists of all the organisms and the physical environment with which they interact. These biotic and abiotic components are linked together through nutrient cycles and energy flows. Energy enters the syste ...
s and the
biosphere The biosphere (from Greek βίος ''bíos'' "life" and σφαῖρα ''sphaira'' "sphere"), also known as the ecosphere (from Greek οἶκος ''oîkos'' "environment" and σφαῖρα), is the worldwide sum of all ecosystems. It can also be ...
, particularly in relation to their capacity to sustain a diversity of life-forms (including human life). The security of ecosystems has attracted greater attention as the impact of ecological damage by humans has grown.


Food security

Food security refers to the ready supply of, and access to, safe and
nutritious Nutrition is the biochemical and physiological process by which an organism uses food to support its life. It provides organisms with nutrients, which can be metabolized to create energy and chemical structures. Failure to obtain sufficient nu ...
food. Food security is gaining in importance as the world's population has grown and productive land has diminished through overuse and
climate change In common usage, climate change describes global warming—the ongoing increase in global average temperature—and its effects on Earth's climate system. Climate change in a broader sense also includes previous long-term changes to E ...
.


Home security

Home security normally refers to the security systems used on a property used as a dwelling (commonly including doors, locks, alarm systems, lighting, fencing); and personal security practices (such as ensuring doors are locked, alarms activated, windows closed etc.)


Human security

Human security is an emerging paradigm which, in response to traditional emphasis on the right of nation states to protect themselves, has focused on the primacy of the security of people (individuals and communities). The concept is supported by the
United Nations General Assembly The United Nations General Assembly (UNGA or GA; french: link=no, Assemblée générale, AG) is one of the six principal organs of the United Nations (UN), serving as the main deliberative, policymaking, and representative organ of the UN. Curr ...
, which has stressed "the right of people to live in
freedom Freedom is understood as either having the ability to act or change without constraint or to possess the power and resources to fulfill one's purposes unhindered. Freedom is often associated with liberty and autonomy in the sense of "giving on ...
and
dignity Dignity is the right of a person to be valued and respected for their own sake, and to be treated ethically. It is of significance in morality, ethics, law and politics as an extension of the Enlightenment-era concepts of inherent, inalienable ...
" and recognized "that all individuals, in particular vulnerable people, are entitled to
freedom from fear Freedom from fear is listed as a fundamental human right according to The Universal Declaration of Human Rights. On January 6, 1941, United States President of the United States, President Franklin D. Roosevelt called it one of the "Four Freedoms ...
and freedom from want".


National security

National security refers to the security of a
nation state A nation state is a political unit where the state and nation are congruent. It is a more precise concept than "country", since a country does not need to have a predominant ethnic group. A nation, in the sense of a common ethnicity, may i ...
, including its people, economy, and institutions. In practice, state governments rely on a wide range of means, including
diplomacy Diplomacy comprises spoken or written communication by representatives of states (such as leaders and diplomats) intended to influence events in the international system.Ronald Peter Barston, ''Modern diplomacy'', Pearson Education, 2006, p. 1 ...
, economic power, and military capabilities.


Perceptions of security

Since it is not possible to know with precision the extent to which something is 'secure' (and a measure of vulnerability is unavoidable), perceptions of security vary, often greatly. For example, a fear of death by earthquake is common in the United States (US), but slipping on the bathroom floor kills more people;Bruce Schneier, ''Beyond Fear: Thinking about Security in an Uncertain World'', Copernicus Books, pages 26–27 and in France, the United Kingdom and the US there are far fewer deaths caused by
terrorism Terrorism, in its broadest sense, is the use of criminal violence to provoke a state of terror or fear, mostly with the intention to achieve political or religious aims. The term is used in this regard primarily to refer to intentional violen ...
than there are women killed by their partners in the home. Another problem of perception is the common assumption that the mere presence of a security system (such as
armed forces A military, also known collectively as armed forces, is a heavily armed, highly organized force primarily intended for warfare. It is typically authorized and maintained by a sovereign state, with its members identifiable by their distinct ...
, or
antivirus software Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses, hence the name. ...
) implies security. For example, two
computer security Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, t ...
programs installed on the same device can prevent each other from working properly, while the user assumes that he or she benefits from twice the protection that only one program would afford.
Security theater Security theater is the practice of taking security measures that are considered to provide the feeling of improved security while doing little or nothing to achieve it. Disadvantages By definition, security theater provides no security benefit ...
is a critical term for measures that change perceptions of security without necessarily affecting security itself. For example, visual signs of security protections, such as a home that advertises its alarm system, may deter an intruder, whether or not the system functions properly. Similarly, the increased presence of military personnel on the streets of a city after a
terrorist attack Terrorism, in its broadest sense, is the use of criminal violence to provoke a state of terror or fear, mostly with the intention to achieve political or religious aims. The term is used in this regard primarily to refer to intentional violen ...
may help to reassure the public, whether or not it diminishes the risk of further attacks.


Security concepts (examples)

Certain concepts recur throughout different fields of security: * Access control – the selective restriction of access to a place or other resource. * Assurance – an expression of confidence that a security measure will perform as expected. *
Authorization Authorization or authorisation (see spelling differences) is the function of specifying access rights/privileges to resources, which is related to general information security and computer security, and to access control in particular. More fo ...
– the function of specifying access rights/privileges to resources related to information security and computer security in general and to access control in particular. * Cipher – an algorithm that defines a set of steps to encrypt or decrypt information so that it is incomprehensible. *
Countermeasure A countermeasure is a measure or action taken to counter or offset another one. As a general concept, it implies precision and is any technological or tactical solution or system designed to prevent an undesirable outcome in the process. The fi ...
– a means of preventing an act or system from having its intended effect. *
Defense in depth Defence in depth (also known as deep defence or elastic defence) is a military strategy that seeks to delay rather than prevent the advance of an attacker, buying time and causing additional casualties by yielding space. Rather than defeating ...
– a school of thought holding that a wider range of security measures will enhance security. *
Exploit Exploit means to take advantage of something (a person, situation, etc.) for one's own end, especially unethically or unjustifiably. Exploit can mean: *Exploitation of natural resources *Exploit (computer security) * Video game exploit *Exploitat ...
(noun) – a means of capitalizing on a vulnerability in a security system (usually a cyber-security system). * Identity management – enables the right individuals to access the right resources at the right times and for the right reasons. *
Password A password, sometimes called a passcode (for example in Apple devices), is secret data, typically a string of characters, usually used to confirm a user's identity. Traditionally, passwords were expected to be memorized, but the large number of ...
– secret data, typically a string of characters, usually used to confirm a user's identity. * Resilience – the degree to which a person, community, nation or system is able to resist adverse external forces. *
Risk In simple terms, risk is the possibility of something bad happening. Risk involves uncertainty about the effects/implications of an activity with respect to something that humans value (such as health, well-being, wealth, property or the environme ...
– a possible event which could lead to damage, harm, or loss. *
Security management Security management is the identification of an organization's assets (including people, buildings, machines, systems and information assets), followed by the development, documentation, and implementation of policies and procedures for protec ...
– identification of an organization's assets (including people, buildings, machines, systems and information assets), followed by the development, documentation, and implementation of policies and procedures for protecting these assets. *
Threat A threat is a communication of intent to inflict harm or loss on another person. Intimidation is a tactic used between conflicting parties to make the other timid or psychologically insecure for coercion or control. The act of intimidation for co ...
– a potential source of harm. *
Vulnerability Vulnerability refers to "the quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally." A window of vulnerability (WOV) is a time frame within which defensive measures are diminished, com ...
– the degree to which something may be changed (usually in an unwanted manner) by external forces.


See also

*
Peace Peace is a concept of societal friendship and harmony in the absence of hostility and violence. In a social sense, peace is commonly used to mean a lack of conflict (such as war) and freedom from fear of violence between individuals or groups. ...
*
Safety Safety is the state of being "safe", the condition of being protected from harm or other danger. Safety can also refer to the control of recognized hazards in order to achieve an acceptable level of risk. Meanings There are two slightly dif ...
*
Security increase A security increase often occurs when a nation, state, or institution has recently suffered from a serious incident or is under the perception that there is an increased risk for an incident to occur that endangers or potentially endangers its well ...
*
Security risk In simple terms, risk is the possibility of something bad happening. Risk involves uncertainty about the effects/implications of an activity with respect to something that humans value (such as health, well-being, wealth, property or the environme ...
* Security convergence


References


External links

* {{Authority control Prevention Law enforcement