Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Security
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{short description|Degree of resistance to, or protection from, harm}} {{Other uses}} {{Redirect|Security breach|the 2021 video game|Five Nights at Freddy's: Security Breach}} [[File:"WAAC - SILENCE MEANS SECURITY" - NARA - 515987.jpg|thumb|[[Women's Army Corps]] (1941–1945) associated [[national security]] with avoiding conversations about war work.]]'''Security''' is protection from, or resilience against, [[potential]] harm (or other unwanted [[coercion]]). [[Beneficiary|Beneficiaries]] (technically [[referent]]s) of security may be persons and social groups, objects and institutions, ecosystems, or any other entity or phenomenon vulnerable to unwanted change. [[File:20151030 Syrians and Iraq refugees arrive at Skala Sykamias Lesvos Greece 2.jpg|thumb|[[Refugee]]s fleeing war and insecurity in Iraq and Syria arrive at [[Lesbos Island]], supported by Spanish volunteers, 2015]] Security mostly refers to protection from hostile forces, but it has a wide range of other senses: for example, as the absence of harm (e.g., [[freedom from want]]); as the presence of an essential good (e.g., [[food security]]); as [[Resilience (organizational)|resilience]] against potential damage or harm (e.g. secure foundations); as secrecy (e.g., a [[Telephone tapping|secure telephone line]]); as containment (e.g., a [[Safe room|secure room]] or [[Prison cell|cell]]); and as a state of mind (e.g., [[emotional security]]). Security is both a feeling and a state of reality. One might feel secure when one is not actually so; or might feel insecure despite being safe. This distinction is usually not very clear to express in the English language.<ref>{{Cite magazine |last=Schneier |first=Bruce |author-link=Bruce Schneier |title=The Difference Between Feeling and Reality in Security |url=https://www.wired.com/2008/04/securitymatters-0403/ |access-date=2024-05-06 |magazine=Wired |language=en-US |issn=1059-1028}}</ref> The term is also used to refer to acts and systems whose purpose may be to provide security ([[security company]], [[security police]], [[security forces]], [[security service (disambiguation)|security service]], [[security agency]], [[security guard]], [[Computer security|cyber security systems]], [[Closed-circuit television|security cameras]], [[remote guarding]]). Security can be [[Physical security|physical]] and [[Computer security|virtual]]. == Etymology == The word 'secure' entered the English language in the 16th century.<ref name=":0" /> It is derived from Latin ''securus'', meaning freedom from anxiety: ''se'' (without) + ''cura'' (care, anxiety).<ref name=":0">{{Cite web|url=https://www.etymonline.com/word/secure|title=Origin and meaning of secure|last=Online Etymology Dictionary|website=etymonline.com|language=en|access-date=2017-12-17}}</ref> == Overview == ===Referent === A security [[referent]] is the focus of a security policy or discourse; for example, a referent may be a potential beneficiary (or victim) of a security policy or system. Security referents may be persons or social groups, objects, institutions, ecosystems, or any other phenomenon vulnerable to unwanted change by the forces of its environment.<ref name=":1">Barry Buzan, Ole Wæver, and Jaap de Wilde, ''Security: A New Framework for Analysis'' (Boulder: Lynne Rienner Publishers, 1998), p. 32</ref> The referent in question may combine many referents in the same way that, for example, a nation-state is composed of many individual citizens.<ref name=":2">{{Cite web|url=https://rethinkingsecurityorguk.files.wordpress.com/2016/10/rethinking-security-a-discussion-paper.pdf |archive-url=https://ghostarchive.org/archive/20221009/https://rethinkingsecurityorguk.files.wordpress.com/2016/10/rethinking-security-a-discussion-paper.pdf |archive-date=2022-10-09 |url-status=live|title=Rethinking Security: A discussion paper|last=Gee|first=D|date=2016|website=rethinkingsecurity.org.uk|publisher=Ammerdown Group|access-date=2017-12-17}}</ref> === Context === The security context is the relationships between a security referent and its environment.<ref name=":1" /> From this perspective, security and insecurity depend first on whether the environment is beneficial or hostile to the referent and also on how capable the referent is of responding to their environment in order to survive and thrive.<ref name=":2" /> === Capabilities === The means by which a referent provides for security (or is provided for) vary widely. They include, for example: * ''Coercive capabilities'', including the capacity to project coercive power into the environment (e.g., [[aircraft carrier|aircraft carriers]], [[handgun|handguns]], [[firearms]]); * ''Protective systems'' (e.g., [[Lock (security device)|lock]], [[fence]], [[wall]], [[antivirus software]], [[Anti-aircraft warfare|air defence system]], [[armour]]) * ''Warning systems'' (e.g., alarm, [[radar]]) * ''Diplomatic and social action'' intended to prevent insecurity from developing (e.g. conflict prevention and transformation strategies); and * ''Policy'' intended to develop the lasting economic, physical, ecological, and other conditions of security (e.g., [[Economics|economic]] reform, [[Ecology|ecological]] protection, [[Demilitarisation|progressive demilitarization]], [[militarization]]). === Effects === Any action intended to provide security may have multiple effects. An action may have a wide benefit, enhancing security for several or all security referents in the context; alternatively, the action may be effective only temporarily, benefit one referent at the expense of another, or be entirely ineffective or counterproductive. === Contested approaches === Approaches to security are contested and the subject of debate. For example, in debate about [[National security|national security strategies]], some argue that security depends principally on developing protective and coercive capabilities in order to protect the security referent in a hostile environment (and potentially to project that power into its environment, and dominate it to the point of [[Full-spectrum dominance|strategic supremacy]]).<ref>{{Cite web|url=http://archive.defense.gov/news/newsarticle.aspx?id=45289|archive-url=https://web.archive.org/web/20150930223537/http://archive.defense.gov/news/newsarticle.aspx?id=45289|url-status=dead|archive-date=September 30, 2015|title=Joint Vision 2020 Emphasizes Full-spectrum Dominance|last=US, Department of Defense|date=2000|website=archive.defense.gov|language=en|access-date=2017-12-17}}</ref><ref>{{Cite web|url=https://publications.parliament.uk/pa/cm201415/cmselect/cmdfence/512/51202.htm|title=Re-thinking defence to meet new threats|last=House of Commons Defence Committee|date=2015|website=publications.parliament.uk|access-date=2017-12-17}}</ref><ref>{{Cite web|url=https://www.gov.uk/government/speeches/building-a-british-military-fit-for-future-challenges-rather-than-past-conflicts|title=Building a British military fit for future challenges rather than past conflicts|last=General Sir Nicholas Houghton|date=2015|website=gov.uk|language=en|access-date=2017-12-17}}</ref> Others argue that security depends principally on building the conditions in which equitable relationships can develop, partly by reducing antagonism between actors, ensuring that fundamental needs can be met, and also ensuring that differences of interest can be negotiated effectively.<ref>{{Cite news|url=https://www.fcnl.org/updates/peace-through-shared-security-79|title=Peace Through Shared Security|last=FCNL|date=2015|access-date=2017-12-17|language=en}}</ref><ref name=":2" /><ref>{{Cite book|title=Losing control : global security in the twenty-first century|last=Rogers|first=P|date=2010|publisher=Pluto Press|isbn=9780745329376|edition=3rd|location=London|oclc=658007519 }}</ref> ==Security contexts (examples) == The table shows some of the main domains where security concerns are prominent. {{col-start}}{{col-break}} '''Informational''' * [[Application security]] * [[Communications security]] * [[Computer security]] * [[Data security]] * [[Digital security]] * [[Endpoint security]] * [[Information security]] * [[Internet security]] * [[Network security]] * [[Usable security]] {{col-break}} '''Physical''' * [[Airport security]] * [[Corporate security]] * [[Food security]] *[[Energy security]] * [[Environmental security]] * [[Home security]] * [[Infrastructure security]] * [[Physical security]] * [[Port security]]/[[Supply chain security]] * [[Security bag]] * [[Security print]] * [[Border control|Border security]] * [[Security seal]] {{col-break}} '''Political''' * [[National security]] * [[Public security]] * [[Homeland security]] * [[Internal security]] * [[International security]] * [[Human security]] * [[Societal security]] '''Monetary''' * [[Economic security]] * [[Social security]] {{col-end}} The range of security contexts is illustrated by the following examples (in alphabetical order): ===Computer security=== {{Main|Computer security}} Computer security, also known as cybersecurity or IT security, refers to the security of computing devices such as [[computer]]s and smartphones, as well as [[computer network]]s such as private and public networks, and the [[Internet access|Internet]]. The field has growing importance due to the increasing reliance on computer systems in most societies.<ref>[http://www.theaustralian.com.au/technology/opinion/reliance-spells-end-of-road-for-ict-amateurs/story-e6frgb0o-1226636267865?nk=34fe4ab684629535daaf6a8fe6e6ef3d "Reliance spells end of road for ICT amateurs"], May 07, 2013, The Australian</ref> It concerns the protection of hardware, software, data, people, and also the procedures by which systems are accessed. The means of computer security include the [[physical security]] of systems and the [[information security|security of information]] held on them. === Corporate security === {{Main|Corporate security}} Corporate security refers to the resilience of [[corporation]]s against [[espionage]], theft, damage, and other threats. The security of corporations has become more complex as reliance on IT systems has increased, and their physical presence has become more highly distributed across several countries, including environments that are, or may rapidly become, hostile to them.[[File:Delta World HQ - entrance with security station.JPG|thumb|Security checkpoint at the entrance to the [[Delta Air Lines]] [[corporate headquarters]] in [[Atlanta]]]] [[File:Flughafenkontrolle.jpg|thumb|[[X-ray machine]]s and [[metal detector]]s are used to control what is allowed to pass through an [[airport security]] perimeter.]] [[File:Mall culture jakarta94.jpg|thumb|Security checkpoint at the entrance to a [[shopping mall]] in [[Jakarta]], [[Indonesia]]]] === Environmental security === {{Main|Environmental security}} Environmental security, also known as ecological security, refers to the integrity of [[ecosystem]]s and the [[biosphere]], particularly in relation to their capacity to sustain a [[Biodiversity|diversity of life-forms]] (including human life). The security of ecosystems has attracted greater attention as the impact of ecological damage by humans has grown.<ref>{{Cite web|url=http://www.un.org/en/ga/search/view_doc.asp?symbol=A/RES/65/161|title=Resolution adopted by the General Assembly on 20 December 2010|last=United Nations General Assembly|date=2010|website=un.org|access-date=2017-12-17}}</ref> [[File:Graffiti about environmental security.jpg|thumb|[[Graffiti]] about [[environmental security]], [[Belarus]], 2016]] === Home security === {{Main|Home security}} Home security normally refers to the security systems used on a property used as a dwelling (commonly including doors, locks, alarm systems, lighting, fencing); and personal security practices (such as ensuring doors are locked, alarms are activated, windows are closed etc.)[[File:Security spikes 1.jpg|thumb|Security spikes on the wall of a [[gated community]] in the [[East End of London]]]] === Human security === {{Main|Human security}} [[File:War in Gaza 018 - Flickr - Al Jazeera English.jpg|thumb|Youth play among the bombed ruins of [[Gaza City]], 2009]] Human security is an emerging [[paradigm]] that, in response to traditional emphasis on the right of nation-states to protect themselves,<ref>{{Cite web|url=http://www.un.org/en/sections/un-charter/chapter-vii/index.html|title=Charter of the United Nations, Chapter VII|last=United Nations|date=1945|website=un.org|language=en|access-date=2017-12-17}}</ref> has focused on the primacy of the security of people (individuals and communities).<ref>{{Cite web|url=http://www.un.org/humansecurity/|title=UN Trust Fund for Human Security|last=United Nations|website=un.org|language=en|access-date=2017-12-17}}</ref> The concept is supported by the [[United Nations General Assembly]], which has stressed "the right of people to live in [[freedom]] and [[dignity]]" and recognized "that all individuals, in particular vulnerable people, are entitled to [[freedom from fear]] and [[freedom from want]]".<ref>{{Cite web|url=http://www.ifrc.org/docs/idrl/I520EN.pdf |archive-url=https://ghostarchive.org/archive/20221009/http://www.ifrc.org/docs/idrl/I520EN.pdf |archive-date=2022-10-09 |url-status=live|title=Resolution adopted by the General Assembly 60/1: World Summit Outcome|last=United Nations General Assembly|date=2005|access-date=2017-12-17}}</ref> ===Information security=== {{Main|Information security}} Information security refers to the security of information in any form. Spoken, written, digital, networked, technological, and procedural forms of information are all examples that may be covered in an [[information security management]] scheme. Computer security, [[IT]] security, [[information and communications technology|ICT]] security, and [[network security]] are thus all subdomains of information security.<ref>{{cite book|title=A Practical Introduction to Security and Risk Management |last=Newsome |first=Bruce |date=2013 |publisher=SAGE Publications |isbn=978-1483313405}}</ref> === National security === {{Main|National security}} [[File:Border Patrol at Canadian border in Beebe Plain, Vermont.jpg|thumb|[[U.S. Customs and Border Protection]] vehicle at the [[Canada–United States border]]]] National security refers to the security of a [[nation state|nation-state]], including its people, economy, and institutions. In practice, state governments rely on a wide range of means, including [[diplomacy]], [[economic power]], and [[Military|military capabilities]]. ===Resource security=== {{also|Food security|Energy security}} "Resource security" refers to the political and [[commerce|commercial]] objective of ensuring that supplies of materials needed for the production of goods and the satisfaction of [[human need]]s can be reliably sustained into the future. It involves protecting the supply of such resources as water, energy, food and industrial [[raw material]]s from risks of [[resource depletion|global depletion]] and risks to national supply incurred by trade restrictions, government or terrorist interference or [[market failure]]s. While [[critical raw materials]] such as [[Rare-earth mineral|rare earth mineral]]s are an important focus of resource security planning, resource security covers a broader range of resources.<ref name=rsap />{{rp|5}} [[Food security]], ensuring that a reliable supply of, and access to, safe and [[Nutrition|nutritious]] food,<ref>{{Cite news|url=http://www.un.org/sustainabledevelopment/hunger/|title=Hunger and food security|last=United Nations|work=United Nations Sustainable Development|access-date=2017-12-17|language=en-US}}</ref> and [[energy security]] are important aspects of resource security. Food security is gaining in importance as the world's population has grown and productive land has diminished through overuse and [[climate change]].<ref>{{Cite web|url=http://www.fao.org/news/story/en/item/209369/icode/|title=Greater focus on soil health needed to feed a hungry planet|last=Food and Agriculture Organization|date=2013|website=fao.org|language=en|access-date=2017-12-17}}</ref><ref>{{Cite news|url=http://www.scientificamerican.com/article/only-60-years-of-farming-left-if-soil-degradation-continues/|title=Only 60 Years of Farming Left If Soil Degradation Continues|last=Arsenault|first=C|date=2014|work=Scientific American|access-date=2017-12-17|language=en}}</ref> [[File:GLOBAL WARMING AFFECTING GLOBAL AGRICULTURE AND FOOD SECURITY.pdf|thumb|[[Climate change]] is affecting global [[agriculture]] and [[food security]].]] The [[UK government]] published a ''Resource Security Action Plan'' for England in March 2012, subtitled "Making the most of valuable resources",{{efn|Responsibility for resource policies and delivery is [[devolved]] to Wales, Northern Ireland and Scotland and therefore policy details may be different in these nations}} responding to concerns raised by businesses and business leaders such as the [[Confederation of British Industry]] (CBI) and the [[Engineering Employers' Federation]] (EEF), and work in this field undertaken by the [[House of Commons Science and Technology Committee]]. The action plan was an interdepartmental initiative for which the [[Department for Environment, Food and Rural Affairs]] (DEFRA) took the lead role as first point of contact for business enquiries.<ref name=rsap>DEFRA and BIS, [https://assets.publishing.service.gov.uk/media/5a79be1640f0b670a8025174/pb13719-resource-security-action-plan.pdf Resource Security Action Plan: Making the most of valuable materials], published in March 2012, accessed on 5 February 2025</ref> Government and business concerns related to "a range of renewable and non-renewable resources", concentrating on those not already covered by [[energy security]] and [[food security]] measures, and especially sought to protect the supply of certain specific metals and materials under supply pressure. A generalised fear of resource insufficiency was felt to be inappropriate: thus [[Vince Cable]], then [[Secretary of State for Business Innovation and Skills]], spoke in December 2011 about a public policy approach to resource management:{{quote|It is over 200 years since the [[Thomas Robert Malthus|Reverend Malthus]] first predicted that [[population growth]] would inevitably outrun the capacity of the land to provide enough food. In the years since, the effects of human ingenuity and new trading routes have shown him to be wrong - though not entirely. Fish depletion is a classic Malthusian problem and is sadly resulting in some irreversible damage to [[fish stocks|stocks]]. The [[sperm whale]] was driven to near extinction by the demand for blubber to light the pre-electric world. But for the most part resource pessimism has been misplaced.<ref>{{OGL-attribution|Cable, V., [https://webarchive.nationalarchives.gov.uk/ukgwa/20130104172435/https://www.gov.uk/government/speeches/resource-security Oral statement: Resource security], published on 12 December 2011, archived by [[The National Archives]] on 4 January 2013, accessed on 26 January 2025}}</ref>}} Similarly the ''Action Plan'' notes that in general the issue of "resource security" is not concerned with "scarcity" of resources but with availability, supply constraints and the potential financial and environmental costs of opening up new sources of supply.<ref name=rsap />{{rp|7}} EEF, the UK's manufacturers' representation organisation (now [[Make UK]]) issued a report in 2014 entitled ''Materials for Manufacturing: Safeguarding Supply'', along with an appeal to the government seeking action to protect the country's supply of essential materials. The report highlighted "over-reliance on [[China]] for strategic supplies" as a key issue. The EEF and other partners argued that an "Office of Resource Management" within government "could strategically co-ordinate action across Whitehall".<ref>Vallely, I., [https://www.manufacturingmanagement.co.uk/content/news/government-warned-to-act-over-growing-risk-to-material-supply Government warned to act over growing risk to material supply], ''Manufacturing Management'', published on 8 July 2014, accessed on 13 February 2025</ref> The office would form part of the [[Department for Business, Innovation and Skills]] and maintain an overview of the risks to resource security.<ref>EEF: the Manufacturers' Organisation, [https://www.edie.net/materials-for-manufacturing-safeguarding-supply/ Materials for Manufacturing: Safeguarding Supply], published on 8 July 2014, accessed on 13 February 2025</ref> == Perceptions of security == Since it is not possible to know with precision the extent to which something is 'secure' (and a measure of vulnerability is unavoidable), perceptions of security vary, often greatly.<ref name=":2" /><ref name=":3" /> For example, a fear of death by earthquake is common in the United States (US), but slipping on the bathroom floor kills more people;<ref name=":3">Bruce Schneier, ''Beyond Fear: Thinking about Security in an Uncertain World'', Copernicus Books, pages 26–27</ref> and in France, the United Kingdom, and the US, there are far fewer deaths caused by [[terrorism]] than there are women killed by their partners in the home.<ref>{{Cite web|url=https://terrorismlegislationreviewer.independent.gov.uk/wp-content/uploads/2013/04/report-terrorism-acts-2011.pdf |archive-url=https://ghostarchive.org/archive/20221009/https://terrorismlegislationreviewer.independent.gov.uk/wp-content/uploads/2013/04/report-terrorism-acts-2011.pdf |archive-date=2022-10-09 |url-status=live|title=The Terrorism Acts in 2011|last=David Anderson QC|date=2012|access-date=2017-12-17}}</ref><ref>{{Cite news|url=https://www.womensaid.org.uk/what-is-femicide/|title=What is femicide?|work=Women's Aid|access-date=2017-12-17|language=en-GB}}</ref><ref>{{Cite news|url=http://www.upworthy.com/dont-believe-in-the-war-on-women-would-a-body-count-change-your-mind|title=Don't Believe In The War On Women? Would A Body Count Change Your Mind?|work=Upworthy|access-date=2017-12-17|language=en}}</ref><ref>{{Cite news|url=http://www.liberation.fr/societe/2015/06/11/violences-conjugales-118-femmes-tuees-en-2014_1327822|title=Violences conjugales: 118 femmes tuées en 2014|work=Libération.fr|access-date=2017-12-17|language=fr}}</ref> Another problem of perception is the common assumption that the mere presence of a security system (such as [[Military|armed forces]] or [[antivirus software]]) implies security. For example, two [[computer security]] programs installed on the same device can prevent each other from working properly, while the user assumes that he or she benefits from twice the protection that only one program would afford. [[Security theater]] is a critical term for measures that change perceptions of security without necessarily affecting security itself. For example, visual signs of security protections, such as a home that advertises its alarm system, may deter an [[Trespasser|intruder]], whether or not the system functions properly. Similarly, the [[Security increase|increased presence of military personnel]] on the streets of a city after a [[Terrorism|terrorist attack]] may help to reassure the public, whether or not it diminishes the risk of further attacks. ==Recurring concepts== Certain concepts recur throughout different fields of security: * [[Access control]] – the selective restriction of access to a place or other resource. * [[Assurance services|Assurance]] – an expression of confidence that a security measure will perform as expected. * [[Authorization]] – the function of specifying access rights/privileges to resources related to information security and computer security in general and to access control in particular. * [[Cipher]] – an algorithm that defines a set of steps to encrypt or decrypt information so that it is incomprehensible. * [[Countermeasure]] – a means of preventing an act or system from having its intended effect. * [[Defense in depth]] – a school of thought holding that a wider range of security measures will enhance security. * [[Exploit (computer security)|Exploit]] (noun) – a means of capitalizing on a vulnerability in a security system (usually a cyber-security system). * [[Identity management]] – enables the right individuals to access the right resources at the right times and for the right reasons. * [[Password]] – secret data, typically a string of characters, usually used to confirm a user's identity. * [[Resilience (organizational)|Resilience]] – the degree to which a person, community, nation or system is able to resist adverse external forces. * [[Risk]] – a possible event which could lead to damage, harm, or loss. * [[Security management]] – identification of an organization's assets (including people, buildings, machines, systems and information assets), followed by the development, documentation, and implementation of policies and procedures for protecting these assets. * [[Security seal]] * [[Threat]] – a potential source of harm. * [[Vulnerability]] – the degree to which something may be changed (usually in an unwanted manner) by external forces. ==See also== * [[Peace]] * [[Safety]] * [[Security increase]] * [[Security risk]] *[[Security convergence]] * [[Gordon–Loeb model]] for cyber security investments ==Notes== {{notelist}} == References == {{Reflist|30em}} ==External links== *{{Commons category-inline}} {{Wikiquote}} {{SecurityType}} {{Risk management}} {{Authority control}} [[Category:Security| ]] [[Category:Prevention]] [[Category:Law enforcement]]
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)
Pages transcluded onto the current version of this page
(
help
)
:
Template:Also
(
edit
)
Template:Authority control
(
edit
)
Template:Cite book
(
edit
)
Template:Cite magazine
(
edit
)
Template:Cite news
(
edit
)
Template:Cite web
(
edit
)
Template:Col-break
(
edit
)
Template:Col-end
(
edit
)
Template:Col-start
(
edit
)
Template:Commons category-inline
(
edit
)
Template:Efn
(
edit
)
Template:Main
(
edit
)
Template:Notelist
(
edit
)
Template:Other uses
(
edit
)
Template:Quote
(
edit
)
Template:Redirect
(
edit
)
Template:Reflist
(
edit
)
Template:Risk management
(
edit
)
Template:Rp
(
edit
)
Template:SecurityType
(
edit
)
Template:Short description
(
edit
)
Template:Wikiquote
(
edit
)