Security is protection from, or resilience against,
potential harm (or other unwanted
coercive
Coercion () is compelling a party to act in an involuntary manner by the use of threats, including threats to use force against a party. It involves a set of forceful actions which violate the free will of an individual in order to induce a desi ...
change) caused by others, by restraining the freedom of others to act. Beneficiaries (technically
referent
A referent () is a person or thing to which a name – a linguistic expression or other symbol – refers. For example, in the sentence ''Mary saw me'', the referent of the word ''Mary'' is the particular person called Mary who is being spoken of, ...
s) of security may be of persons and social groups, objects and institutions, ecosystems or any other entity or phenomenon vulnerable to unwanted change.
Security mostly refers to protection from hostile forces, but it has a wide range of other senses: for example, as the absence of harm (e.g.
freedom from want
The right to an adequate standard of living is a fundamental human rights, human right. It is part of the Universal Declaration of Human Rights that was accepted by the United Nations General Assembly, General Assembly of the United Nations on De ...
); as the presence of an essential good (e.g.
food security
Food security speaks to the availability of food in a country (or geography) and the ability of individuals within that country (geography) to access, afford, and source adequate foodstuffs. According to the United Nations' Committee on World F ...
); as
resilience against potential damage or harm (e.g. secure foundations); as secrecy (e.g. a
secure telephone line); as containment (e.g. a secure room or
cell); and as a state of mind (e.g.
emotional security
Emotional security is the measure of the stability of an individual's emotional state. Emotional insecurity or simply insecurity is a feeling of general unease or nervousness that may be triggered by perceiving of oneself to be vulnerable or in ...
).
The term is also used to refer to acts and systems whose purpose may be to provide security (security companies,
security forces,
security guard
A security guard (also known as a security inspector, security officer, or protective agent) is a person employed by a government or private party to protect the employing party's assets (property, people, equipment, money, etc.) from a variety ...
,
cyber security systems,
security cameras
Closed-circuit television (CCTV), also known as video surveillance, is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in that the signal is not openly tr ...
,
remote guarding). Security can be
physical
Physical may refer to:
*Physical examination
In a physical examination, medical examination, or clinical examination, a medical practitioner examines a patient for any possible medical signs or symptoms of a medical condition. It generally co ...
and
virtual.
Etymology
The word 'secure' entered the English language in the 16th century.
It is derived from Latin ''securus'', meaning freedom from anxiety: ''se'' (without) + ''cura'' (care, anxiety).
Overview
Referent
A security
referent
A referent () is a person or thing to which a name – a linguistic expression or other symbol – refers. For example, in the sentence ''Mary saw me'', the referent of the word ''Mary'' is the particular person called Mary who is being spoken of, ...
is the focus of a security policy or discourse; for example, a referent may be a potential beneficiary (or victim) of a security policy or system.
Security referents may be persons or social groups, objects, institutions, ecosystems, or any other phenomenon vulnerable to unwanted change by the forces of its environment.
[Barry Buzan, Ole Wæver, and Jaap de Wilde, ''Security: A New Framework for Analysis'' (Boulder: Lynne Rienner Publishers, 1998), p. 32] The referent in question may combine many referents, in the same way that, for example, a nation state is composed of many individual citizens.
Context
The security context is the relationships between a security referent and its environment.
From this perspective, security and insecurity depend first on whether the environment is beneficial or hostile to the referent, and also how capable is the referent of responding to its/their environment in order to survive and thrive.
Capabilities
The means by which a referent provides for security (or is provided for) vary widely. They include, for example:
* ''Coercive capabilities'', including the capacity to project coercive power into the environment (e.g.
aircraft carrier
An aircraft carrier is a warship that serves as a seagoing airbase, equipped with a full-length flight deck and facilities for carrying, arming, deploying, and recovering aircraft. Typically, it is the capital ship of a fleet, as it allows a ...
,
handgun
A handgun is a short- barrelled gun, typically a firearm, that is designed to be usable with only one hand. It is distinguished from a long gun (i.e. rifle, shotgun or machine gun, etc.), which needs to be held by both hands and also braced ...
,
firearms
A firearm is any type of gun designed to be readily carried and used by an individual. The term is legally defined further in different countries (see Legal definitions).
The first firearms originated in 10th-century China, when bamboo tubes c ...
);
* ''Protective systems'' (e.g.
lock,
fence,
wall
A wall is a structure and a surface that defines an area; carries a load; provides security, shelter, or soundproofing; or, is decorative. There are many kinds of walls, including:
* Walls in buildings that form a fundamental part of the supe ...
,
antivirus software,
air defence system
Anti-aircraft warfare, counter-air or air defence forces is the battlespace response to aerial warfare, defined by NATO as "all measures designed to nullify or reduce the effectiveness of hostile air action".AAP-6 It includes surface based, ...
,
armour
Armour (British English) or armor (American English; see spelling differences) is a covering used to protect an object, individual, or vehicle from physical injury or damage, especially direct contact weapons or projectiles during combat, or fr ...
)
* ''Warning systems'' (e.g. alarm,
radar
Radar is a detection system that uses radio waves to determine the distance (''ranging''), angle, and radial velocity of objects relative to the site. It can be used to detect aircraft, ships, spacecraft, guided missiles, motor vehicles, w ...
)
* ''Diplomatic and social action'' intended to prevent insecurity from developing (e.g. conflict prevention and transformation strategies); and
* ''Policy'' intended to develop the lasting economic, physical, ecological and other conditions of security (e.g.
economic
An economy is an area of the Production (economics), production, Distribution (economics), distribution and trade, as well as Consumption (economics), consumption of Goods (economics), goods and Service (economics), services. In general, it is ...
reform,
ecological protection,
progressive demilitarization,
militarization
Militarization, or militarisation, is the process by which a society organizes itself for military conflict and violence. It is related to militarism, which is an ideology that reflects the level of militarization of a state. The process of milit ...
).
Effects
Any action intended to provide security may have multiple effects. For example, an action may have wide benefit, enhancing security for several or all security referents in the context; alternatively, the action may be effective only temporarily, or benefit one referent at the expense of another, or be entirely ineffective or counterproductive.
Contested approaches
Approaches to security are contested and the subject of debate. For example, in debate about
national security strategies, some argue that security depends principally on developing protective and coercive capabilities in order to protect the security referent in a hostile environment (and potentially to project that power into its environment, and dominate it to the point of
strategic supremacy). Others argue that security depends principally on building the conditions in which equitable relationships can develop, partly by reducing antagonism between actors, ensuring that fundamental needs can be met, and also that differences of interest can be negotiated effectively.
Contexts of security (examples)
The table shows some of the main domains where security concerns are prominent.
IT realm
*
Application security
Application security (short AppSec) includes all tasks that introduce a secure software development life cycle to development teams. Its final goal is to improve security practices and, through that, to find, fix and preferably prevent security i ...
*
Communications security
*
Computer security
Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, the ...
*
Data security
*
Digital security
Digital security refers to various ways of protecting a computer's internet account and files from intrusion by an outside user or a hacker.
Computers and the Internet
Internet security involves the protection of a computer's internet account a ...
*
Endpoint security
Endpoint security or endpoint protection is an approach to the protection of computer networks that are remotely bridged to client devices. The connection of endpoint devices such as laptops, tablets, mobile phones, Internet-of-things devices, ...
*
Information security
Information security, sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorize ...
*
Internet security
*
Network security
*
Usable Security
Usability can be described as the capacity of a system to provide a condition for its users to perform the tasks safely, effectively, and efficiently while enjoying the experience. In software engineering, usability is the degree to which a soft ...
Physical realm
*
Airport security
*
Corporate security
*
Food security
Food security speaks to the availability of food in a country (or geography) and the ability of individuals within that country (geography) to access, afford, and source adequate foodstuffs. According to the United Nations' Committee on World F ...
*
Environmental security
*
Home security
*
Infrastructure security
*
Physical security
Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment and resources and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks). Physica ...
*
Port security
Port security is part of a broader definition concerning maritime security. It refers to the defense, law and treaty enforcement, and counterterrorism activities that fall within the port and maritime domain. It includes the protection of the sea ...
/
Supply chain security
__NOTOC__
Supply chain security (also "supply-chain security") activities aim to enhance the security of the supply chain or value chain, the transport and logistics systems for the world's cargo and to "facilitate legitimate trade".Government o ...
*
Security bag
*
Security print
Security printing is the field of the printing industry that deals with the printing of items such as banknotes, cheques, passports, tamper-evident labels, security tapes, product authentication, stock certificates, postage stamps and identity c ...
*
Border security
*
Security seal
Security seals are tamper-evident mechanisms that seal valuable material in a room, cabinet, vehicle, or other storage facility. One common use is to seal cargo in transit shipping containers in a way that provides tamper evidence and some lev ...
Political
*
National security
National security, or national defence, is the security and defence of a sovereign state, including its citizens, economy, and institutions, which is regarded as a duty of government. Originally conceived as protection against military atta ...
*
Public security
*
Homeland security
Homeland security is an American national security term for "the national effort to ensure a homeland that is safe, secure, and resilient against terrorism and other hazards where American interests, aspirations, and ways of life can thrive" to ...
*
Internal security
*
International security
International security, also called global security is a term which refers to the measures taken by states and international organizations, such as the United Nations, European Union, and others, to ensure mutual survival and safety. These meas ...
*
Human security
Monetary
*
Economic security
Economic security or financial security is the condition of having stable income or other resources to support a standard of living now and in the foreseeable future. It includes:
* probable continued solvency
* predictability of the future cash fl ...
/financial security
*
Social security
Welfare, or commonly social welfare, is a type of government support intended to ensure that members of a society can meet basic human needs such as food and shelter. Social security may either be synonymous with welfare, or refer specificall ...
The range of security contexts is illustrated by the following examples (in alphabetical order):
Computer security
Computer security
Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, the ...
, also known as cybersecurity or IT security, refers to the security of computing devices such as
computer
A computer is a machine that can be programmed to Execution (computing), carry out sequences of arithmetic or logical operations (computation) automatically. Modern digital electronic computers can perform generic sets of operations known as C ...
s and smartphones, as well as
computer network
A computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other. These interconnections are ...
s such as private and public networks, and the
Internet
The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
. The field has growing importance due to the increasing reliance on computer systems in most societies. It concerns the protection of hardware, software, data, people, and also the procedures by which systems are accessed. The means of computer security include the
physical security
Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment and resources and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks). Physica ...
of systems and
security of information held on them.
Corporate security
Corporate security refers to the resilience of
corporation
A corporation is an organization—usually a group of people or a company—authorized by the state to act as a single entity (a legal entity recognized by private and public law "born out of statute"; a legal person in legal context) and r ...
s against
espionage
Espionage, spying, or intelligence gathering is the act of obtaining secret or confidential information (intelligence) from non-disclosed sources or divulging of the same without the permission of the holder of the information for a tangibl ...
, theft, damage, and other threats. The security of corporations has become more complex as reliance on IT systems has increased, and their physical presence has become more highly distributed across several countries, including environments that are, or may rapidly become, hostile to them.
Ecological security
Ecological security, also known as environmental security, refers to the integrity of
ecosystem
An ecosystem (or ecological system) consists of all the organisms and the physical environment with which they interact. These biotic and abiotic components are linked together through nutrient cycles and energy flows. Energy enters the syste ...
s and the
biosphere, particularly in relation to their capacity to sustain a
diversity of life-forms (including human life). The security of ecosystems has attracted greater attention as the impact of ecological damage by humans has grown.
Food security
Food security refers to the ready supply of, and access to, safe and
nutritious food. Food security is gaining in importance as the world's population has grown and productive land has diminished through overuse and
climate change
In common usage, climate change describes global warming—the ongoing increase in global average temperature—and its effects on Earth's climate system. Climate change in a broader sense also includes previous long-term changes to E ...
.
Home security
Home security normally refers to the security systems used on a property used as a dwelling (commonly including doors, locks, alarm systems, lighting, fencing); and personal security practices (such as ensuring doors are locked, alarms activated, windows closed etc.)
Human security
Human security is an emerging
paradigm
In science and philosophy, a paradigm () is a distinct set of concepts or thought patterns, including theories, research methods, postulates, and standards for what constitute legitimate contributions to a field.
Etymology
''Paradigm'' comes f ...
which, in response to traditional emphasis on the right of nation states to protect themselves, has focused on the primacy of the security of people (individuals and communities). The concept is supported by the
United Nations General Assembly
The United Nations General Assembly (UNGA or GA; french: link=no, Assemblée générale, AG) is one of the six principal organs of the United Nations (UN), serving as the main deliberative, policymaking, and representative organ of the UN. Curr ...
, which has stressed "the right of people to live in
freedom
Freedom is understood as either having the ability to act or change without constraint or to possess the power and resources to fulfill one's purposes unhindered. Freedom is often associated with liberty and autonomy in the sense of "giving on ...
and
dignity
Dignity is the right of a person to be valued and respected for their own sake, and to be treated ethically. It is of significance in morality, ethics, law and politics as an extension of the Enlightenment-era concepts of inherent, inalienable ...
" and recognized "that all individuals, in particular vulnerable people, are entitled to
freedom from fear and
freedom from want
The right to an adequate standard of living is a fundamental human rights, human right. It is part of the Universal Declaration of Human Rights that was accepted by the United Nations General Assembly, General Assembly of the United Nations on De ...
".
National security
National security refers to the security of a
nation state
A nation state is a political unit where the state and nation are congruent. It is a more precise concept than "country", since a country does not need to have a predominant ethnic group.
A nation, in the sense of a common ethnicity, may inc ...
, including its people, economy, and institutions. In practice, state governments rely on a wide range of means, including
diplomacy
Diplomacy comprises spoken or written communication by representatives of states (such as leaders and diplomats) intended to influence events in the international system.Ronald Peter Barston, ''Modern diplomacy'', Pearson Education, 2006, p. 1 ...
,
economic power
Economic power refers to the ability of countries, businesses or individuals to improve living standards. It increases their ability to make decisions on their own that benefit them. Scholars of international relations also refer to the economic p ...
, and
military capabilities
This is a list of countries by level of military equipment, including naval ships, fighter aircraft and nuclear weapons. This list is indicative only, as strict comparisons cannot accurately be made.
List
States marked 'TC' are widely consid ...
.
Perceptions of security
Since it is not possible to know with precision the extent to which something is 'secure' (and a measure of vulnerability is unavoidable), perceptions of security vary, often greatly.
For example, a fear of death by earthquake is common in the United States (US), but slipping on the bathroom floor kills more people;
[Bruce Schneier, ''Beyond Fear: Thinking about Security in an Uncertain World'', Copernicus Books, pages 26–27] and in France, the United Kingdom and the US there are far fewer deaths caused by
terrorism
Terrorism, in its broadest sense, is the use of criminal violence to provoke a state of terror or fear, mostly with the intention to achieve political or religious aims. The term is used in this regard primarily to refer to intentional violen ...
than there are women killed by their partners in the home.
Another problem of perception is the common assumption that the mere presence of a security system (such as
armed forces
A military, also known collectively as armed forces, is a heavily armed, highly organized force primarily intended for warfare. It is typically authorized and maintained by a sovereign state, with its members identifiable by their distinct ...
, or
antivirus software) implies security. For example, two
computer security
Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, the ...
programs installed on the same device can prevent each other from working properly, while the user assumes that he or she benefits from twice the protection that only one program would afford.
Security theater
Security theater is the practice of taking security measures that are considered to provide the feeling of improved security while doing little or nothing to achieve it.
Disadvantages
By definition, security theater provides no security benefit ...
is a critical term for measures that change perceptions of security without necessarily affecting security itself. For example, visual signs of security protections, such as a home that advertises its alarm system, may deter an
intruder
Intruder may refer to:
Film and television
* ''The Intruder'' (1914 film), directed by Wallace Reid
* ''The Intruder'' (1933 film), an American film by Albert Ray
* ''The Intruder'' (1939 film), ''La intrusa'', an Argentine film by Julio Sa ...
, whether or not the system functions properly. Similarly, the
increased presence of military personnel on the streets of a city after a
terrorist attack may help to reassure the public, whether or not it diminishes the risk of further attacks.
Security concepts (examples)
Certain concepts recur throughout different fields of security:
*
Access control
In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource, while access management describes the process. The act of ''accessing'' may mean consuming ...
– the selective restriction of access to a place or other resource.
*
Assurance – an expression of confidence that a security measure will perform as expected.
*
Authorization – the function of specifying access rights/privileges to resources related to information security and computer security in general and to access control in particular.
*
Cipher
In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is ''encipherment''. To encipher or encode i ...
– an algorithm that defines a set of steps to encrypt or decrypt information so that it is incomprehensible.
*
Countermeasure – a means of preventing an act or system from having its intended effect.
*
Defense in depth
Defence in depth (also known as deep defence or elastic defence) is a military strategy that seeks to delay rather than prevent the advance of an attacker, buying time and causing additional casualties by yielding space. Rather than defeating ...
– a school of thought holding that a wider range of security measures will enhance security.
*
Exploit
Exploit means to take advantage of something (a person, situation, etc.) for one's own end, especially unethically or unjustifiably.
Exploit can mean:
* Exploitation of natural resources
*Exploit (computer security)
* Video game exploit
*Exploita ...
(noun) – a means of capitalizing on a vulnerability in a security system (usually a cyber-security system).
*
Identity management – enables the right individuals to access the right resources at the right times and for the right reasons.
*
Password – secret data, typically a string of characters, usually used to confirm a user's identity.
*
Resilience – the degree to which a person, community, nation or system is able to resist adverse external forces.
*
Risk
In simple terms, risk is the possibility of something bad happening. Risk involves uncertainty about the effects/implications of an activity with respect to something that humans value (such as health, well-being, wealth, property or the environme ...
– a possible event which could lead to damage, harm, or loss.
*
Security management – identification of an organization's assets (including people, buildings, machines, systems and information assets), followed by the development, documentation, and implementation of policies and procedures for protecting these assets.
*
Threat
A threat is a communication of intent to inflict harm or loss on another person. Intimidation is a tactic used between conflicting parties to make the other timid or psychologically insecure for coercion or control. The act of intimidation for co ...
– a potential source of harm.
*
Vulnerability – the degree to which something may be changed (usually in an unwanted manner) by external forces.
See also
*
Peace
Peace is a concept of societal friendship and harmony in the absence of hostility and violence. In a social sense, peace is commonly used to mean a lack of conflict (such as war) and freedom from fear of violence between individuals or groups. ...
*
Safety
Safety is the state of being "safe", the condition of being protected from harm or other danger. Safety can also refer to risk management, the control of recognized hazards in order to achieve an acceptable level of risk.
Meanings
There are ...
*
Security increase
*
Security risk
In simple terms, risk is the possibility of something bad happening. Risk involves uncertainty about the effects/implications of an activity with respect to something that humans value (such as health, well-being, wealth, property or the environme ...
*
Security convergence Security convergence refers to the convergence of two historically distinct security functions – physical security and information security – within enterprises; both are integral parts of a coherent risk management program. Security co ...
References
External links
*
{{Authority control
Prevention
Law enforcement