Security is protection from, or resilience against,
potential harm (or other unwanted
coercive change) caused by others, by restraining the freedom of others to act. Beneficiaries (technically
referents) of security may be of persons and social groups, objects and institutions, ecosystems or any other entity or phenomenon vulnerable to unwanted change.

Security mostly refers to protection from hostile forces, but it has a wide range of other senses: for example, as the absence of harm (e.g.
freedom from want); as the presence of an essential good (e.g.
food security); as
resilience against potential damage or harm (e.g. secure foundations); as secrecy (e.g. a
secure telephone line); as containment (e.g. a secure room or
cell); and as a state of mind (e.g.
emotional security).
The term is also used to refer to acts and systems whose purpose may be to provide security (security companies,
security forces,
security guard,
cyber security systems,
security cameras,
remote guarding). Security can be
physical and
virtual.
Etymology
The word 'secure' entered the English language in the 16th century.
It is derived from Latin ''securus'', meaning freedom from anxiety: ''se'' (without) + ''cura'' (care, anxiety).
Overview
Referent
A security
referent is the focus of a security policy or discourse; for example, a referent may be a potential beneficiary (or victim) of a security policy or system.
Security referents may be persons or social groups, objects, institutions, ecosystems, or any other phenomenon vulnerable to unwanted change by the forces of its environment.
[Barry Buzan, Ole Wæver, and Jaap de Wilde, ''Security: A New Framework for Analysis'' (Boulder: Lynne Rienner Publishers, 1998), p. 32] The referent in question may combine many referents, in the same way that, for example, a nation state is composed of many individual citizens.
Context
The security context is the relationships between a security referent and its environment.
From this perspective, security and insecurity depend first on whether the environment is beneficial or hostile to the referent, and also how capable is the referent of responding to its/their environment in order to survive and thrive.
Capabilities
The means by which a referent provides for security (or is provided for) vary widely. They include, for example:
* ''Coercive capabilities'', including the capacity to project coercive power into the environment (e.g.
aircraft carrier,
handgun
A handgun is a short- barrelled gun, typically a firearm, that is designed to be usable with only one hand. It is distinguished from a long gun (i.e. rifle, shotgun or machine gun, etc.), which needs to be held by both hands and also brac ...
,
firearms);
* ''Protective systems'' (e.g.
lock,
fence
A fence is a structure that encloses an area, typically outdoors, and is usually constructed from posts that are connected by boards, wire, rails or netting. A fence differs from a wall in not having a solid foundation along its whole length.
...
,
wall,
antivirus software,
air defence system,
armour
Armour (British English
British English (BrE, en-GB, or BE) is, according to Lexico, Oxford Dictionaries, "English language, English as used in Great Britain, as distinct from that used elsewhere". More narrowly, it can refer specificall ...
)
* ''Warning systems'' (e.g. alarm,
radar
Radar is a detection system that uses radio waves to determine the distance ('' ranging''), angle, and radial velocity of objects relative to the site. It can be used to detect aircraft, ships, spacecraft, guided missiles, motor vehicles, w ...
)
* ''Diplomatic and social action'' intended to prevent insecurity from developing (e.g. conflict prevention and transformation strategies); and
* ''Policy'' intended to develop the lasting economic, physical, ecological and other conditions of security (e.g.
economic
An economy is an area of the production, distribution and trade, as well as consumption of goods and services. In general, it is defined as a social domain that emphasize the practices, discourses, and material expressions associated with t ...
reform,
ecological protection,
progressive demilitarization,
militarization).
Effects
Any action intended to provide security may have multiple effects. For example, an action may have wide benefit, enhancing security for several or all security referents in the context; alternatively, the action may be effective only temporarily, or benefit one referent at the expense of another, or be entirely ineffective or counterproductive.
Contested approaches
Approaches to security are contested and the subject of debate. For example, in debate about
national security strategies, some argue that security depends principally on developing protective and coercive capabilities in order to protect the security referent in a hostile environment (and potentially to project that power into its environment, and dominate it to the point of
strategic supremacy). Others argue that security depends principally on building the conditions in which equitable relationships can develop, partly by reducing antagonism between actors, ensuring that fundamental needs can be met, and also that differences of interest can be negotiated effectively.
Contexts of security (examples)
The table shows some of the main domains where security concerns are prominent.
IT realm
*
Application security
*
Communications security
*
Computer security
*
Data security
*
Digital security
*
Endpoint security
*
Information security
Information security, sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthori ...
*
Internet security
*
Network security
Network security consists of the policies, processes and practices adopted to prevent, detect and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves th ...
*
Usable Security
Physical realm
*
Airport security
Airport security includes the techniques and methods used in an attempt to protect passengers, staff, aircraft, and airport property from malicious harm, crime, terrorism, and other threats.
Aviation security is a combination of measures and hu ...
*
Corporate security
*
Food security
*
Environmental security
*
Home security
*
Infrastructure security
*
Physical security
*
Port security/
Supply chain security
__NOTOC__
Supply chain security (also "supply-chain security") activities aim to enhance the security of the supply chain or value chain, the transport and logistics systems for the world's cargo and to "facilitate legitimate trade".Government o ...
*
Security bag
*
Security print
*
Border security
*
Security seal
Political
*
National security
*
Public security
*
Homeland security
*
Internal security
Internal security is the act of keeping peace within the borders of a sovereign state or other Self-governance, self-governing territories, generally by upholding the national law and defending against internal security threats. Responsibility fo ...
*
International security
*
Human security Human security is a paradigm for understanding global vulnerabilities whose proponents challenges the traditional notion of national security through military security by arguing that the proper referent for security should be at the human rather ...
Monetary
*
Economic security/financial security
*
Social security
Welfare, or commonly social welfare, is a type of government support intended to ensure that members of a society can meet basic human needs such as food and shelter. Social security may either be synonymous with welfare, or refer specificall ...
The range of security contexts is illustrated by the following examples (in alphabetical order):
Computer security
Computer security, also known as cybersecurity or IT security, refers to the security of computing devices such as
computers and smartphones, as well as
computer network
A computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other. These interconnections ar ...
s such as private and public networks, and the
Internet
The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a ''internetworking, network of networks'' that consists ...
. The field has growing importance due to the increasing reliance on computer systems in most societies. It concerns the protection of hardware, software, data, people, and also the procedures by which systems are accessed. The means of computer security include the
physical security of systems and
security of information held on them.
Corporate security
Corporate security refers to the resilience of
corporation
A corporation is an organization—usually a group of people or a company—authorized by the state to act as a single entity (a legal entity recognized by private and public law "born out of statute"; a legal person in legal context) and ...
s against
espionage
Espionage, spying, or intelligence gathering is the act of obtaining secret or confidential information ( intelligence) from non-disclosed sources or divulging of the same without the permission of the holder of the information for a tang ...
, theft, damage, and other threats. The security of corporations has become more complex as reliance on IT systems has increased, and their physical presence has become more highly distributed across several countries, including environments that are, or may rapidly become, hostile to them.
Ecological security
Ecological security, also known as environmental security, refers to the integrity of
ecosystem
An ecosystem (or ecological system) consists of all the organisms and the physical environment with which they interact. These biotic and abiotic components are linked together through nutrient cycles and energy flows. Energy enters the syst ...
s and the
biosphere
The biosphere (from Greek βίος ''bíos'' "life" and σφαῖρα ''sphaira'' "sphere"), also known as the ecosphere (from Greek οἶκος ''oîkos'' "environment" and σφαῖρα), is the worldwide sum of all ecosystems. It can also be ...
, particularly in relation to their capacity to sustain a
diversity of life-forms (including human life). The security of ecosystems has attracted greater attention as the impact of ecological damage by humans has grown.
Food security
Food security refers to the ready supply of, and access to, safe and
nutritious food. Food security is gaining in importance as the world's population has grown and productive land has diminished through overuse and
climate change
In common usage, climate change describes global warming—the ongoing increase in global average temperature—and its effects on Earth's climate system. Climate change in a broader sense also includes previous long-term changes to ...
.
Home security
Home security normally refers to the security systems used on a property used as a dwelling (commonly including doors, locks, alarm systems, lighting, fencing); and personal security practices (such as ensuring doors are locked, alarms activated, windows closed etc.)
Human security

Human security is an emerging
paradigm which, in response to traditional emphasis on the right of nation states to protect themselves, has focused on the primacy of the security of people (individuals and communities). The concept is supported by the
United Nations General Assembly
The United Nations General Assembly (UNGA or GA; french: link=no, Assemblée générale, AG) is one of the six principal organs of the United Nations (UN), serving as the main deliberative, policymaking, and representative organ of the UN. Cur ...
, which has stressed "the right of people to live in
freedom and
dignity" and recognized "that all individuals, in particular vulnerable people, are entitled to
freedom from fear and
freedom from want".
National security
National security refers to the security of a
nation state
A nation state is a political unit where the state and nation are congruent. It is a more precise concept than "country", since a country does not need to have a predominant ethnic group.
A nation, in the sense of a common ethnicity, may i ...
, including its people, economy, and institutions. In practice, state governments rely on a wide range of means, including
diplomacy
Diplomacy comprises spoken or written communication by representatives of states (such as leaders and diplomats) intended to influence events in the international system.Ronald Peter Barston, ''Modern diplomacy'', Pearson Education, 2006, p. 1 ...
,
economic power, and
military capabilities.
Perceptions of security
Since it is not possible to know with precision the extent to which something is 'secure' (and a measure of vulnerability is unavoidable), perceptions of security vary, often greatly.
For example, a fear of death by earthquake is common in the United States (US), but slipping on the bathroom floor kills more people;
[Bruce Schneier, ''Beyond Fear: Thinking about Security in an Uncertain World'', Copernicus Books, pages 26–27] and in France, the United Kingdom and the US there are far fewer deaths caused by
terrorism
Terrorism, in its broadest sense, is the use of criminal violence to provoke a state of terror or fear, mostly with the intention to achieve political or religious aims. The term is used in this regard primarily to refer to intentional violen ...
than there are women killed by their partners in the home.
Another problem of perception is the common assumption that the mere presence of a security system (such as
armed forces, or
antivirus software) implies security. For example, two
computer security programs installed on the same device can prevent each other from working properly, while the user assumes that he or she benefits from twice the protection that only one program would afford.
Security theater is a critical term for measures that change perceptions of security without necessarily affecting security itself. For example, visual signs of security protections, such as a home that advertises its alarm system, may deter an
intruder
Intruder may refer to:
Film and television
* ''The Intruder'' (1914 film), directed by Wallace Reid
* ''The Intruder'' (1933 film), an American film by Albert Ray
* ''The Intruder'' (1939 film), ''La intrusa'', an Argentine film by Julio Sa ...
, whether or not the system functions properly. Similarly, the
increased presence of military personnel on the streets of a city after a
terrorist attack may help to reassure the public, whether or not it diminishes the risk of further attacks.
Security concepts (examples)
Certain concepts recur throughout different fields of security:
*
Access control – the selective restriction of access to a place or other resource.
*
Assurance – an expression of confidence that a security measure will perform as expected.
*
Authorization – the function of specifying access rights/privileges to resources related to information security and computer security in general and to access control in particular.
*
Cipher – an algorithm that defines a set of steps to encrypt or decrypt information so that it is incomprehensible.
*
Countermeasure – a means of preventing an act or system from having its intended effect.
*
Defense in depth – a school of thought holding that a wider range of security measures will enhance security.
*
Exploit
Exploit means to take advantage of something (a person, situation, etc.) for one's own end, especially unethically or unjustifiably.
Exploit can mean:
* Exploitation of natural resources
*Exploit (computer security)
* Video game exploit
*Exploita ...
(noun) – a means of capitalizing on a vulnerability in a security system (usually a cyber-security system).
*
Identity management – enables the right individuals to access the right resources at the right times and for the right reasons.
*
Password – secret data, typically a string of characters, usually used to confirm a user's identity.
*
Resilience – the degree to which a person, community, nation or system is able to resist adverse external forces.
*
Risk
In simple terms, risk is the possibility of something bad happening. Risk involves uncertainty about the effects/implications of an activity with respect to something that humans value (such as health, well-being, wealth, property or the environme ...
– a possible event which could lead to damage, harm, or loss.
*
Security management – identification of an organization's assets (including people, buildings, machines, systems and information assets), followed by the development, documentation, and implementation of policies and procedures for protecting these assets.
*
Threat – a potential source of harm.
*
Vulnerability – the degree to which something may be changed (usually in an unwanted manner) by external forces.
See also
*
Peace
Peace is a concept of societal friendship and harmony in the absence of hostility and violence. In a social sense, peace is commonly used to mean a lack of conflict (such as war) and freedom from fear of violence between individuals or groups. ...
*
Safety
*
Security increase
*
Security risk
*
Security convergence Security convergence refers to the convergence of two historically distinct security functions – physical security and information security – within enterprises; both are integral parts of a coherent risk management program. Security co ...
References
External links
*
{{Authority control
Prevention
Law enforcement