soft security
   HOME

TheInfoList



OR:

Soft security usually refers to
security" \n\n\nsecurity.txt is a proposed standard for websites' security information that is meant to allow security researchers to easily report security vulnerabilities. The standard prescribes a text file called \"security.txt\" in the well known locat ...
that protects something from harm in quiet and unobtrusive ways, often invisibly and after the fact, rather than with visible barriers before the fact. Soft security can refer to immediate security measures, such as silent
burglar alarm A security alarm is a system designed to detect intrusion, such as unauthorized entry, into a building or other areas such as a home or school. Security alarms used in residential, commercial, industrial, and military properties protect against ...
s or motion detectors, but often refers to more elaborate social security systems such as the " moral network" in a tightly knit community — for example, a cluster of friends on a busy city street. The term has gained widespread use in
wiki A wiki ( ) is an online hypertext publication collaboratively edited and managed by its own audience, using a web browser. A typical wiki contains multiple pages for the subjects or scope of the project, and could be either open to the pub ...
communities, notably MeatballWiki. The differentiation between "soft security" and " hard security" was first made by Rasmusson and Jansson who used the term hard security for traditional mechanisms like authentication and access control, and soft security for social control mechanisms. There is a difference between the related concepts of quality control and soft security. Soft security attempts to discourage harm and mitigate any damage, while quality control attempts to improve a product and weed out non-conforming output. The social controls on the production of
Wikipedia Wikipedia is a multilingual free online encyclopedia written and maintained by a community of volunteers, known as Wikipedians, through open collaboration and using a wiki-based editing system. Wikipedia is the largest and most-read refer ...
documents demonstrate both principles, using discussion pages, accessible edit histories,
policies and guidelines Policy is a deliberate system of guidelines to guide decisions and achieve rational outcomes. A policy is a statement of intent and is implemented as a procedure or protocol. Policies are generally adopted by a governance body within an orga ...
, in contrast to traditional document control mechanisms such as
workflow A workflow consists of an orchestrated and repeatable pattern of activity, enabled by the systematic organization of resources into processes that transform materials, provide services, or process information. It can be depicted as a sequence o ...
and
authorization Authorization or authorisation (see spelling differences) is the function of specifying access rights/privileges to resources, which is related to general information security and computer security, and to access control in particular. More fo ...
, to achieve both soft security and quality control. In commercial security, soft security is often achieved through training of staff to manage the environment (1) to make disruptions more noticeable, (2) to make disruptions less ''socially'' acceptable, and (3) to create a perceived ''vested interest'' in the public.


References

{{Reflist


External links

* ''SoftSecurity'' on MeatballWiki Security