Share to: share facebook share twitter share wa share telegram print page

Security

Women's Army Corps (1941–1945) associated national security with avoiding conversations about war work.

Security is protection from, or resilience against, potential harm (or other unwanted coercion). Beneficiaries (technically referents) of security may be persons and social groups, objects and institutions, ecosystems, or any other entity or phenomenon vulnerable to unwanted change.

Refugees fleeing war and insecurity in Iraq and Syria arrive at Lesbos Island, supported by Spanish volunteers, 2015

Security mostly refers to protection from hostile forces, but it has a wide range of other senses: for example, as the absence of harm (e.g., freedom from want); as the presence of an essential good (e.g., food security); as resilience against potential damage or harm (e.g. secure foundations); as secrecy (e.g., a secure telephone line); as containment (e.g., a secure room or cell); and as a state of mind (e.g., emotional security).

Security is both a feeling and a state of reality. One can feel secure, while they aren't, but also feel insecure while they are secure. This distinction is usually not very clear to express in the English language.[1]

The term is also used to refer to acts and systems whose purpose may be to provide security (security company, security police, security forces, security service, security agency, security guard, cyber security systems, security cameras, remote guarding). Security can be physical and virtual.

Etymology

The word 'secure' entered the English language in the 16th century.[2] It is derived from Latin securus, meaning freedom from anxiety: se (without) + cura (care, anxiety).[2]

Overview

Referent

A security referent is the focus of a security policy or discourse; for example, a referent may be a potential beneficiary (or victim) of a security policy or system.

Security referents may be persons or social groups, objects, institutions, ecosystems, or any other phenomenon vulnerable to unwanted change by the forces of its environment.[3] The referent in question may combine many referents in the same way that, for example, a nation-state is composed of many individual citizens.[4]

Context

The security context is the relationships between a security referent and its environment.[3] From this perspective, security and insecurity depend first on whether the environment is beneficial or hostile to the referent and also on how capable the referent is of responding to their environment in order to survive and thrive.[4]

Capabilities

The means by which a referent provides for security (or is provided for) vary widely. They include, for example:

Effects

Any action intended to provide security may have multiple effects. For example, an action may have a wide benefit, enhancing security for several or all security referents in the context; alternatively, the action may be effective only temporarily, benefit one referent at the expense of another, or be entirely ineffective or counterproductive.

Contested approaches

Approaches to security are contested and the subject of debate. For example, in debate about national security strategies, some argue that security depends principally on developing protective and coercive capabilities in order to protect the security referent in a hostile environment (and potentially to project that power into its environment, and dominate it to the point of strategic supremacy).[5][6][7] Others argue that security depends principally on building the conditions in which equitable relationships can develop, partly by reducing antagonism between actors, ensuring that fundamental needs can be met, and also ensuring that differences of interest can be negotiated effectively.[8][4][9]

Security contexts (examples)

The table shows some of the main domains where security concerns are prominent.

The range of security contexts is illustrated by the following examples (in alphabetical order):

Computer security

Computer security, also known as cybersecurity or IT security, refers to the security of computing devices such as computers and smartphones, as well as computer networks such as private and public networks, and the Internet. The field has growing importance due to the increasing reliance on computer systems in most societies.[10] It concerns the protection of hardware, software, data, people, and also the procedures by which systems are accessed. The means of computer security include the physical security of systems and the security of information held on them.

Corporate security

Corporate security refers to the resilience of corporations against espionage, theft, damage, and other threats. The security of corporations has become more complex as reliance on IT systems has increased, and their physical presence has become more highly distributed across several countries, including environments that are, or may rapidly become, hostile to them.

Security checkpoint at the entrance to the Delta Air Lines corporate headquarters in Atlanta
X-ray machines and metal detectors are used to control what is allowed to pass through an airport security perimeter.
Security checkpoint at the entrance to a shopping mall in Jakarta, Indonesia

Environmental security

Environmental security, also known as ecological security, refers to the integrity of ecosystems and the biosphere, particularly in relation to their capacity to sustain a diversity of life-forms (including human life). The security of ecosystems has attracted greater attention as the impact of ecological damage by humans has grown.[11]

Graffiti about environmental security, Belarus, 2016

Food security

Food security refers to the ready supply of, and access to, safe and nutritious food.[12] Food security is gaining in importance as the world's population has grown and productive land has diminished through overuse and climate change.[13][14]

Climate change is affecting global agriculture and food security.

Home security

Home security normally refers to the security systems used on a property used as a dwelling (commonly including doors, locks, alarm systems, lighting, fencing); and personal security practices (such as ensuring doors are locked, alarms are activated, windows are closed etc.)

Security spikes on the wall of a gated community in the East End of London

Human security

Youth play among the bombed ruins of Gaza City, 2009

Human security is an emerging paradigm that, in response to traditional emphasis on the right of nation-states to protect themselves,[15] has focused on the primacy of the security of people (individuals and communities).[16] The concept is supported by the United Nations General Assembly, which has stressed "the right of people to live in freedom and dignity" and recognized "that all individuals, in particular vulnerable people, are entitled to freedom from fear and freedom from want".[17]

Information security

Information security refers to the security of information in any form. Spoken, written, digital, networked, technological, and procedural forms of information are all examples that may be covered in an information security management scheme. Computer security, IT security, ICT security, and network security are thus all subdomains of information security.[18]

National security

National security refers to the security of a nation-state, including its people, economy, and institutions. In practice, state governments rely on a wide range of means, including diplomacy, economic power, and military capabilities.

U.S. Customs and Border Protection vehicle at the Canada–United States border

Security concepts (examples)

Certain concepts recur throughout different fields of security:

  • Access control – the selective restriction of access to a place or other resource.
  • Assurance – an expression of confidence that a security measure will perform as expected.
  • Authorization – the function of specifying access rights/privileges to resources related to information security and computer security in general and to access control in particular.
  • Cipher – an algorithm that defines a set of steps to encrypt or decrypt information so that it is incomprehensible.
  • Countermeasure – a means of preventing an act or system from having its intended effect.
  • Defense in depth – a school of thought holding that a wider range of security measures will enhance security.
  • Exploit (noun) – a means of capitalizing on a vulnerability in a security system (usually a cyber-security system).
  • Identity management – enables the right individuals to access the right resources at the right times and for the right reasons.
  • Password – secret data, typically a string of characters, usually used to confirm a user's identity.
  • Resilience – the degree to which a person, community, nation or system is able to resist adverse external forces.
  • Risk – a possible event which could lead to damage, harm, or loss.
  • Security management – identification of an organization's assets (including people, buildings, machines, systems and information assets), followed by the development, documentation, and implementation of policies and procedures for protecting these assets.
  • Security seal
  • Threat – a potential source of harm.
  • Vulnerability – the degree to which something may be changed (usually in an unwanted manner) by external forces.

Perceptions of security

Since it is not possible to know with precision the extent to which something is 'secure' (and a measure of vulnerability is unavoidable), perceptions of security vary, often greatly.[4][19] For example, a fear of death by earthquake is common in the United States (US), but slipping on the bathroom floor kills more people;[19] and in France, the United Kingdom, and the US, there are far fewer deaths caused by terrorism than there are women killed by their partners in the home.[20][21][22][23]

Another problem of perception is the common assumption that the mere presence of a security system (such as armed forces or antivirus software) implies security. For example, two computer security programs installed on the same device can prevent each other from working properly, while the user assumes that he or she benefits from twice the protection that only one program would afford.

Security theater is a critical term for measures that change perceptions of security without necessarily affecting security itself. For example, visual signs of security protections, such as a home that advertises its alarm system, may deter an intruder, whether or not the system functions properly. Similarly, the increased presence of military personnel on the streets of a city after a terrorist attack may help to reassure the public, whether or not it diminishes the risk of further attacks.

See also

References

  1. ^ Schneier, Bruce. "The Difference Between Feeling and Reality in Security". Wired. ISSN 1059-1028. Retrieved 2024-05-06.
  2. ^ a b Online Etymology Dictionary. "Origin and meaning of secure". etymonline.com. Retrieved 2017-12-17.
  3. ^ a b Barry Buzan, Ole Wæver, and Jaap de Wilde, Security: A New Framework for Analysis (Boulder: Lynne Rienner Publishers, 1998), p. 32
  4. ^ a b c d Gee, D (2016). "Rethinking Security: A discussion paper" (PDF). rethinkingsecurity.org.uk. Ammerdown Group. Archived (PDF) from the original on 2022-10-09. Retrieved 2017-12-17.
  5. ^ US, Department of Defense (2000). "Joint Vision 2020 Emphasizes Full-spectrum Dominance". archive.defense.gov. Retrieved 2017-12-17.
  6. ^ House of Commons Defence Committee (2015). "Re-thinking defence to meet new threats". publications.parliament.uk. Retrieved 2017-12-17.
  7. ^ General Sir Nicholas Houghton (2015). "Building a British military fit for future challenges rather than past conflicts". gov.uk. Retrieved 2017-12-17.
  8. ^ FCNL (2015). "Peace Through Shared Security". Retrieved 2017-12-17.
  9. ^ Rogers, P (2010). Losing control : global security in the twenty-first century (3rd ed.). London: Pluto Press. ISBN 9780745329376. OCLC 658007519.
  10. ^ "Reliance spells end of road for ICT amateurs", May 07, 2013, The Australian
  11. ^ United Nations General Assembly (2010). "Resolution adopted by the General Assembly on 20 December 2010". un.org. Retrieved 2017-12-17.
  12. ^ United Nations. "Hunger and food security". United Nations Sustainable Development. Retrieved 2017-12-17.
  13. ^ Food and Agriculture Organization (2013). "Greater focus on soil health needed to feed a hungry planet". fao.org. Retrieved 2017-12-17.
  14. ^ Arsenault, C (2014). "Only 60 Years of Farming Left If Soil Degradation Continues". Scientific American. Retrieved 2017-12-17.
  15. ^ United Nations (1945). "Charter of the United Nations, Chapter VII". un.org. Retrieved 2017-12-17.
  16. ^ United Nations. "UN Trust Fund for Human Security". un.org. Retrieved 2017-12-17.
  17. ^ United Nations General Assembly (2005). "Resolution adopted by the General Assembly 60/1: World Summit Outcome" (PDF). Archived (PDF) from the original on 2022-10-09. Retrieved 2017-12-17.
  18. ^ Newsome, Bruce (2013). A Practical Introduction to Security and Risk Management. SAGE Publications. ISBN 1483313409.
  19. ^ a b Bruce Schneier, Beyond Fear: Thinking about Security in an Uncertain World, Copernicus Books, pages 26–27
  20. ^ David Anderson QC (2012). "The Terrorism Acts in 2011" (PDF). Archived (PDF) from the original on 2022-10-09. Retrieved 2017-12-17.
  21. ^ "What is femicide?". Women's Aid. Retrieved 2017-12-17.
  22. ^ "Don't Believe In The War On Women? Would A Body Count Change Your Mind?". Upworthy. Retrieved 2017-12-17.
  23. ^ "Violences conjugales: 118 femmes tuées en 2014". Libération.fr (in French). Retrieved 2017-12-17.

External links

  • Media related to Security at Wikimedia Commons
Baca informasi lainnya:

Pemilihan umum Wali Kota Pariaman 20242018202927 November 2024Kandidat Peta persebaran suara Wali Kota dan Wakil Wali Kota petahanaGenius Umar Independen Wali Kota dan Wakil Wali Kota terpilih belum diketahui Pemilihan umum Wali Kota Pariaman 2024 (selanjutnya disebut Pilkada Kota Pariaman 2024) dilaksanakan pada 27 November 2024 untuk memilih Wali Kota Pariaman periode 2024-2029.[1] Pemilihan Wali Kota (Pilwalkot) Pariaman tahun tersebut akan diselenggarakan setelah Pemilihan umum Presi…

Tracy Caldwell DysonLahir14 Agustus 1969 (umur 54)Arcadia, California, ASStatusAktifKebangsaanAmerika SerikatAlmamaterCalifornia State University, Fullerton,B.S. Chemistry 1993University of California, Davis,Ph.D. Chemistry 1997PekerjaanKimiawatiKarier luar angkasaAntariksawati NASAWaktu di luar angkasa188 hari, 19 jam, 14 menitSeleksiKelompok NASA 1998Total EVA3Total waktu EVA22 jam, 49 menitMisiSTS-118, Soyuz TMA-18 (Ekspedisi 23/24)Lambang misi Tracy Caldwell Dyson (nama lahir Tracy Elle…

Charlbi DeanDean di Festival Film Cannes 2022LahirCharlbi Dean Kriek(1990-02-05)5 Februari 1990Cape Town, Afrika SelatanMeninggal29 Agustus 2022(2022-08-29) (umur 32)New York City, Amerika SerikatPekerjaanAktrismodelTahun aktif2003–2022PasanganLuke Volker (2018–2022) Charlbi Dean Kriek (/ˈʃɑːrlbi/ SHARL-bee;[1] 5 Februari 1990 – 29 Agustus 2022) adalah seorang aktris dan model asal Afrika Selatan.[2] Dia terkenal karena perannya dalam film seri S…

Callimetopus illecebrosus Klasifikasi ilmiah Kerajaan: Animalia Filum: Arthropoda Kelas: Insecta Ordo: Coleoptera Famili: Cerambycidae Subfamili: Lamiinae Tribus: Pteropliini Genus: Callimetopus Spesies: Callimetopus illecebrosus Callimetopus illecebrosus adalah spesies kumbang tanduk panjang yang tergolong familia Cerambycidae. Spesies ini juga merupakan bagian dari genus Callimetopus, ordo Coleoptera, kelas Insecta, filum Arthropoda, dan kingdom Animalia. Larva kumbang ini biasanya mengebor ke…

Регион УкраиныОбластьПолтавская областьукр. Полтавська область Флаг Герб 49°30′ с. ш. 34°00′ в. д.HGЯO Страна  Украина Включает 4 района Адм. центр  Полтава Глава областной государственной администрации Филипп Евгеньевич Пронин[1] Председатель областной ра…

1950 mystery film by Paul L. Stein The 20 Questions Murder MysteryDirected byPaul L. SteinScreenplay byVictor KatonaPatrick KirwanProduced byVictor KatonaSteven PallosStarringRobert BeattyRona AndersonClifford EvansCinematographyTed LloydErnest PalmerEdited byGerald ThomasMusic byHans MayProductioncompaniesPax FilmsPendennis ProductionsRelease date 23 January 1950 (1950-01-23) Running time95 minutesCountryUnited KingdomLanguageEnglish The Twenty Questions Murder Mystery, also know…

Lut

Untuk tokoh ini dalam sudut pandang Yahudi dan Kristen, lihat Lot. NabiLūṭلوط'alaihissalamKaligrafi Luth 'alaihis-salamMakamBani Na'im, PalestinaTempat tinggalMesopotamiaSyamPendahuluIbrahimPenggantiIsmailIshaqOrang tuaHaranKerabatAzar (kakek)Ibrahim (paman)Ismail (sepupu)Ishaq (sepupu) Nabi dan Rasul dalam Islam Nabi dalam Al-Qur'anMenyesuaikan antara nama Islam dan Alkitab. ʾĀdam (Adam) ʾIdrīs (Henokh?) Nūḥ (Nuh) Hūd (Eber?) Ṣāliḥ (Selah) ʾIbrāhīm (Abraham) Lūṭ (Lot) …

Uskup agung atau uskup metropolit dalam Kekristenan adalah seorang uskup yang memperoleh pengangkatan. Dalam Gereja Katolik dan Gereja-Gereja lain, uskup agung mengepalai sebuah keuskupan utama yang disebut keuskupan agung, atau disebut provinsi gerejawi dalam komuni Anglikan. Uskup agung setara dengan uskup dari segi kerohaniannya akan tetapi uskup agung lebih tinggi prestise atau derajatnya. Uskup agung bukanlah suatu tahbisan tersendiri, melainkan adalah jabatan koordinator. Dengan demikian, …

Pour les articles homonymes, voir Resident Evil (homonymie). Resident EvilLogo officiel de Resident Evil.Développeur CapcomÉditeur CapcomRéalisateur Shinji MikamiScénariste Kenichi IwaoYasuyuki SagaCompositeur Takashi NiigakiProducteur Masayuki AkahoriTokuro FujiwaraDébut du projet 1993Date de sortie PlayStation 22 mars 1996 30 mars 1996 1er août 1996 Autres sorties Windows 6 décembre 1996 17 juillet 1997 [1] Sega Saturn 25 juillet 1997 31 août 1997 1er octobre 1997 Director's Cut 25 sep…

The Lord of the RingsPoster berisi karakter-karakter dan adegan dari ketiga filmSutradaraPeter JacksonProduser Peter Jackson Barrie M. Osborne Fran Walsh Mark Ordesky Tim Sanders(The Fellowship of the Ring) Skenario Fran Walsh Philippa Boyens Peter Jackson Stephen Sinclair(The Two Towers) BerdasarkanThe Lord of the Ringsoleh J. R. R. TolkienPemeran Elijah Wood Ian McKellen Liv Tyler Viggo Mortensen Sean Astin Cate Blanchett John Rhys-Davies Bernard Hill Billy Boyd Dominic Monaghan Orlando Bloom …

Strada statale 50del Grappa e del Passo RolleLocalizzazioneStato Italia RegioniVenetoTrentino-Alto Adige DatiClassificazioneStrada statale InizioPonte nelle Alpi FinePredazzo Lunghezza116,000 km Provvedimento di istituzioneLegge 17/05/1928 n° 1094[1] GestoreTratte ANAS: da Ponte nelle Alpi a Fonzaso; dal 1998 la gestione del tratto confine col Veneto - Predazzo è passata alla Provincia autonoma di Trento; dal 2001 la gestione del tratto Fonzaso - confine col Trentino-Alto Adige è…

Rock formation in the Havasu National Wildlife Refuge, Arizona For other uses, see The Needles (disambiguation). The Needles, at Topock Gorge from the northwest looking down the Colorado River, April 2006. The Needles are a distinctive group of rock pinnacles, mountain peaks adjacent to the Topock Gorge, and the Colorado River on the northwestern extreme of the Mojave Mountains within the Havasu National Wildlife Refuge in Mohave County, Arizona, United States.[1] They range from 1207 to…

Kota Malang memiliki sejarah yang panjang, mulai dari masa purbakala. Kota yang didirikan pada zaman Belanda[1] ini telah mengalami berbagai peristiwa penting, mulai dari kejayaan kerajaan-kerajaan di Nusantara hingga pembangunan kota secara besar-besaran oleh Pemerintah Penjajahan Belanda. Kota ini didirikan pada 1 April 1914 sebagai kotapraja. Etimologi Asal usul penamaan Malang sampai sekarang masih diperdebatkan oleh para ahli sejarah. Nama Malang muncul pertama kali pada Prasasti Pa…

WikiLeaks tak ada hubungannya dengan Wikipedia ataupun Yayasan Wikimedia. WikiLeaksURLwikileaks.orgEponimwiki TipeArsip dokumenPerdagangan ?TidakRegistration (en)Tidak adaLangueInggris Mesin perangkat lunakMediaWiki PemilikThe Sunshine Press[1]PembuatJulian AssangeWeb DeveloperJulian Assange Service entry (en)Desember 2006NegaraAustralia Penghargaan(2011)  José Couso award (en)  Walkley Award for Most Outstanding Contribution to Journalism (en) Peringkat Alexa16.899 (20 N…

Christoph Metzelder Metzelder pada tahun 2010.Informasi pribadiNama lengkap Christoph Tobias MetzelderTanggal lahir 5 November 1980 (umur 43)Tempat lahir Haltern, Jerman BaratTinggi 1,94 m (6 ft 4+1⁄2 in)Posisi bermain BekKarier junior1986–1995 TuS Haltern1995–1996 Schalke 041996–1998 Preußen MünsterKarier senior*Tahun Tim Tampil (Gol)1999–2000 Preußen Münster 32 (4)2000–2007 Borussia Dortmund 126 (2)2007–2010 Real Madrid 23 (0)2010–2013 Schalke 04 52 …

Prof. (Em) Drs.Dorodjatun Kuntjoro-JaktiMA, Ph.D. Menteri Koordinator Bidang Perekonomian Republik Indonesia ke-10Masa jabatan10 Agustus 2001 – 20 Oktober 2004PresidenMegawati Soekarnoputri PendahuluBurhanuddin AbdullahPenggantiAburizal Bakrie Informasi pribadiLahir25 November 1939 (umur 84)Rangkasbitung, Banten, Hindia BelandaKebangsaanIndonesiaPartai politikNon partisipanSuami/istriEmiwaty (istri)Alma materUniversitas Indonesia Universitas California, BerkeleyPekerjaanEkono…

Disambiguazione – Se stai cercando altri significati, vedi Perl (disambigua). Questa voce o sezione sull'argomento informatica è priva o carente di note e riferimenti bibliografici puntuali. Commento: Presenti solo 2 note di conto Sebbene vi siano una bibliografia e/o dei collegamenti esterni, manca la contestualizzazione delle fonti con note a piè di pagina o altri riferimenti precisi che indichino puntualmente la provenienza delle informazioni. Puoi migliorare questa voce citando le f…

Romanian football manager (1939–2016) Ted Dumitru Personal informationFull name Dumitru TeodorescuDate of birth (1939-09-02)2 September 1939Place of birth Bucharest, Kingdom of RomaniaDate of death 26 May 2016(2016-05-26) (aged 76)Place of death Johannesburg, Gauteng, South AfricaManagerial careerYears Team1966 Universitatea Craiova1967–1968 Romania U-231969–1970 Altay Izmir1970–1971 Beşiktaş1971 Mersin İdmanyurdu1971–1973 Texas Longhorns1974–1975 Rochester Lancers1976–1980…

1st First Lady of the Marshall Islands (1979–1996) Emlain Kabua1st First Lady of Marshall IslandsIn officeNovember 17, 1979 – December 19, 1996PresidentAmata KabuaPreceded byOffice createdSucceeded by Christina Lemari (Acting) Hiromi Kabua (1997) Personal detailsBornEmlain Kudo Kabua(1928-02-28)28 February 1928[1]South Seas MandateDied11 April 2023(2023-04-11) (aged 95)NationalityMarshallesePolitical partyIndependentSpouseAmata KabuaChildren7, including DavidOccupationA…

فارمينغديل     الإحداثيات 40°44′00″N 73°26′42″W / 40.7333°N 73.445°W / 40.7333; -73.445   [1] تاريخ التأسيس 1687  تقسيم إداري  البلد الولايات المتحدة[2]  التقسيم الأعلى أويستر باي  خصائص جغرافية  المساحة 2.902586 كيلومتر مربع2.902588 كيلومتر مربع (1 أبريل 2010)  ارتفا…

Kembali kehalaman sebelumnya