Security Checkpoints In Promenade Road - Geograph
   HOME

TheInfoList



OR:

Security is protection from, or resilience against, potential harm (or other unwanted coercive change) caused by others, by restraining the freedom of others to act. Beneficiaries (technically
referent A referent () is a person or thing to which a name – a linguistic expression or other symbol – refers. For example, in the sentence ''Mary saw me'', the referent of the word ''Mary'' is the particular person called Mary who is being spoken of, ...
s) of security may be of persons and social groups, objects and institutions, ecosystems or any other entity or phenomenon vulnerable to unwanted change. Security mostly refers to protection from hostile forces, but it has a wide range of other senses: for example, as the absence of harm (e.g.
freedom from want The right to an adequate standard of living is a fundamental human rights, human right. It is part of the Universal Declaration of Human Rights that was accepted by the United Nations General Assembly, General Assembly of the United Nations on De ...
); as the presence of an essential good (e.g. food security); as resilience against potential damage or harm (e.g. secure foundations); as secrecy (e.g. a secure telephone line); as containment (e.g. a secure room or cell); and as a state of mind (e.g.
emotional security Emotional security is the measure of the stability of an individual's emotional state. Emotional insecurity or simply insecurity is a feeling of general unease or nervousness that may be triggered by perceiving of oneself to be vulnerable or in ...
). The term is also used to refer to acts and systems whose purpose may be to provide security (security companies, security forces,
security guard A security guard (also known as a security inspector, security officer, or protective agent) is a person employed by a government or private party to protect the employing party's assets (property, people, equipment, money, etc.) from a variety ...
, cyber security systems, security cameras, remote guarding). Security can be physical and virtual.


Etymology

The word 'secure' entered the English language in the 16th century. It is derived from Latin ''securus'', meaning freedom from anxiety: ''se'' (without) + ''cura'' (care, anxiety).


Overview


Referent

A security
referent A referent () is a person or thing to which a name – a linguistic expression or other symbol – refers. For example, in the sentence ''Mary saw me'', the referent of the word ''Mary'' is the particular person called Mary who is being spoken of, ...
is the focus of a security policy or discourse; for example, a referent may be a potential beneficiary (or victim) of a security policy or system. Security referents may be persons or social groups, objects, institutions, ecosystems, or any other phenomenon vulnerable to unwanted change by the forces of its environment.Barry Buzan, Ole Wæver, and Jaap de Wilde, ''Security: A New Framework for Analysis'' (Boulder: Lynne Rienner Publishers, 1998), p. 32 The referent in question may combine many referents, in the same way that, for example, a nation state is composed of many individual citizens.


Context

The security context is the relationships between a security referent and its environment. From this perspective, security and insecurity depend first on whether the environment is beneficial or hostile to the referent, and also how capable is the referent of responding to its/their environment in order to survive and thrive.


Capabilities

The means by which a referent provides for security (or is provided for) vary widely. They include, for example: * ''Coercive capabilities'', including the capacity to project coercive power into the environment (e.g.
aircraft carrier An aircraft carrier is a warship that serves as a seagoing airbase, equipped with a full-length flight deck and facilities for carrying, arming, deploying, and recovering aircraft. Typically, it is the capital ship of a fleet, as it allows a ...
,
handgun A handgun is a short- barrelled gun, typically a firearm, that is designed to be usable with only one hand. It is distinguished from a long gun (i.e. rifle, shotgun or machine gun, etc.), which needs to be held by both hands and also braced ...
,
firearms A firearm is any type of gun designed to be readily carried and used by an individual. The term is legally defined further in different countries (see Legal definitions). The first firearms originated in 10th-century China, when bamboo tubes c ...
); * ''Protective systems'' (e.g. lock, fence, wall, antivirus software, air defence system,
armour Armour (British English) or armor (American English; see spelling differences) is a covering used to protect an object, individual, or vehicle from physical injury or damage, especially direct contact weapons or projectiles during combat, or fr ...
) * ''Warning systems'' (e.g. alarm, radar) * ''Diplomatic and social action'' intended to prevent insecurity from developing (e.g. conflict prevention and transformation strategies); and * ''Policy'' intended to develop the lasting economic, physical, ecological and other conditions of security (e.g. economic reform, ecological protection, progressive demilitarization, militarization).


Effects

Any action intended to provide security may have multiple effects. For example, an action may have wide benefit, enhancing security for several or all security referents in the context; alternatively, the action may be effective only temporarily, or benefit one referent at the expense of another, or be entirely ineffective or counterproductive.


Contested approaches

Approaches to security are contested and the subject of debate. For example, in debate about national security strategies, some argue that security depends principally on developing protective and coercive capabilities in order to protect the security referent in a hostile environment (and potentially to project that power into its environment, and dominate it to the point of strategic supremacy). Others argue that security depends principally on building the conditions in which equitable relationships can develop, partly by reducing antagonism between actors, ensuring that fundamental needs can be met, and also that differences of interest can be negotiated effectively.


Contexts of security (examples)

The table shows some of the main domains where security concerns are prominent. IT realm * Application security * Communications security * Computer security * Data security * Digital security * Endpoint security * Information security * Internet security * Network security * Usable Security Physical realm * Airport security * Corporate security * Food security * Environmental security * Home security * Infrastructure security * Physical security * Port security/
Supply chain security __NOTOC__ Supply chain security (also "supply-chain security") activities aim to enhance the security of the supply chain or value chain, the transport and logistics systems for the world's cargo and to "facilitate legitimate trade".Government o ...
* Security bag * Security print * Border security * Security seal Political *
National security National security, or national defence, is the security and defence of a sovereign state, including its citizens, economy, and institutions, which is regarded as a duty of government. Originally conceived as protection against military atta ...
* Public security * Homeland security * Internal security *
International security International security, also called global security is a term which refers to the measures taken by states and international organizations, such as the United Nations, European Union, and others, to ensure mutual survival and safety. These meas ...
* Human security Monetary * Economic security/financial security * Social security The range of security contexts is illustrated by the following examples (in alphabetical order):


Computer security

Computer security, also known as cybersecurity or IT security, refers to the security of computing devices such as
computer A computer is a machine that can be programmed to Execution (computing), carry out sequences of arithmetic or logical operations (computation) automatically. Modern digital electronic computers can perform generic sets of operations known as C ...
s and smartphones, as well as computer networks such as private and public networks, and the Internet. The field has growing importance due to the increasing reliance on computer systems in most societies. It concerns the protection of hardware, software, data, people, and also the procedures by which systems are accessed. The means of computer security include the physical security of systems and security of information held on them.


Corporate security

Corporate security refers to the resilience of corporations against espionage, theft, damage, and other threats. The security of corporations has become more complex as reliance on IT systems has increased, and their physical presence has become more highly distributed across several countries, including environments that are, or may rapidly become, hostile to them.


Ecological security

Ecological security, also known as environmental security, refers to the integrity of ecosystems and the biosphere, particularly in relation to their capacity to sustain a diversity of life-forms (including human life). The security of ecosystems has attracted greater attention as the impact of ecological damage by humans has grown.


Food security

Food security refers to the ready supply of, and access to, safe and nutritious food. Food security is gaining in importance as the world's population has grown and productive land has diminished through overuse and climate change.


Home security

Home security normally refers to the security systems used on a property used as a dwelling (commonly including doors, locks, alarm systems, lighting, fencing); and personal security practices (such as ensuring doors are locked, alarms activated, windows closed etc.)


Human security

Human security is an emerging
paradigm In science and philosophy, a paradigm () is a distinct set of concepts or thought patterns, including theories, research methods, postulates, and standards for what constitute legitimate contributions to a field. Etymology ''Paradigm'' comes f ...
which, in response to traditional emphasis on the right of nation states to protect themselves, has focused on the primacy of the security of people (individuals and communities). The concept is supported by the United Nations General Assembly, which has stressed "the right of people to live in
freedom Freedom is understood as either having the ability to act or change without constraint or to possess the power and resources to fulfill one's purposes unhindered. Freedom is often associated with liberty and autonomy in the sense of "giving on ...
and dignity" and recognized "that all individuals, in particular vulnerable people, are entitled to freedom from fear and
freedom from want The right to an adequate standard of living is a fundamental human rights, human right. It is part of the Universal Declaration of Human Rights that was accepted by the United Nations General Assembly, General Assembly of the United Nations on De ...
".


National security

National security refers to the security of a nation state, including its people, economy, and institutions. In practice, state governments rely on a wide range of means, including diplomacy,
economic power Economic power refers to the ability of countries, businesses or individuals to improve living standards. It increases their ability to make decisions on their own that benefit them. Scholars of international relations also refer to the economic p ...
, and
military capabilities This is a list of countries by level of military equipment, including naval ships, fighter aircraft and nuclear weapons. This list is indicative only, as strict comparisons cannot accurately be made. List States marked 'TC' are widely consid ...
.


Perceptions of security

Since it is not possible to know with precision the extent to which something is 'secure' (and a measure of vulnerability is unavoidable), perceptions of security vary, often greatly. For example, a fear of death by earthquake is common in the United States (US), but slipping on the bathroom floor kills more people;Bruce Schneier, ''Beyond Fear: Thinking about Security in an Uncertain World'', Copernicus Books, pages 26–27 and in France, the United Kingdom and the US there are far fewer deaths caused by terrorism than there are women killed by their partners in the home. Another problem of perception is the common assumption that the mere presence of a security system (such as
armed forces A military, also known collectively as armed forces, is a heavily armed, highly organized force primarily intended for warfare. It is typically authorized and maintained by a sovereign state, with its members identifiable by their distinct ...
, or antivirus software) implies security. For example, two computer security programs installed on the same device can prevent each other from working properly, while the user assumes that he or she benefits from twice the protection that only one program would afford. Security theater is a critical term for measures that change perceptions of security without necessarily affecting security itself. For example, visual signs of security protections, such as a home that advertises its alarm system, may deter an
intruder Intruder may refer to: Film and television * ''The Intruder'' (1914 film), directed by Wallace Reid * ''The Intruder'' (1933 film), an American film by Albert Ray * ''The Intruder'' (1939 film), ''La intrusa'', an Argentine film by Julio Sa ...
, whether or not the system functions properly. Similarly, the increased presence of military personnel on the streets of a city after a terrorist attack may help to reassure the public, whether or not it diminishes the risk of further attacks.


Security concepts (examples)

Certain concepts recur throughout different fields of security: *
Access control In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource, while access management describes the process. The act of ''accessing'' may mean consuming ...
– the selective restriction of access to a place or other resource. * Assurance – an expression of confidence that a security measure will perform as expected. * Authorization – the function of specifying access rights/privileges to resources related to information security and computer security in general and to access control in particular. *
Cipher In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is ''encipherment''. To encipher or encode i ...
– an algorithm that defines a set of steps to encrypt or decrypt information so that it is incomprehensible. * Countermeasure – a means of preventing an act or system from having its intended effect. * Defense in depth – a school of thought holding that a wider range of security measures will enhance security. *
Exploit Exploit means to take advantage of something (a person, situation, etc.) for one's own end, especially unethically or unjustifiably. Exploit can mean: * Exploitation of natural resources *Exploit (computer security) * Video game exploit *Exploita ...
(noun) – a means of capitalizing on a vulnerability in a security system (usually a cyber-security system). * Identity management – enables the right individuals to access the right resources at the right times and for the right reasons. * Password – secret data, typically a string of characters, usually used to confirm a user's identity. * Resilience – the degree to which a person, community, nation or system is able to resist adverse external forces. * Risk – a possible event which could lead to damage, harm, or loss. * Security management – identification of an organization's assets (including people, buildings, machines, systems and information assets), followed by the development, documentation, and implementation of policies and procedures for protecting these assets. * Threat – a potential source of harm. * Vulnerability – the degree to which something may be changed (usually in an unwanted manner) by external forces.


See also

* Peace * Safety * Security increase * Security risk *
Security convergence Security convergence refers to the convergence of two historically distinct security functions – physical security and information security – within enterprises; both are integral parts of a coherent risk management program. Security co ...


References


External links

* {{Authority control Prevention Law enforcement