Security

Security

Security is the condition of being protected against danger, loss, and criminals. In the general sense, security is a concept similar to safety. The nuance between the two is an added emphasis on being protected from dangers that originate from outside. Individuals or actions that encroach upon the condition of protection are responsible for the breach of security.

The word "security" in general usage is synonymous with "safety," but as a technical term "security" means that something not only "is secure" but that it "has been secured". In telecommunications, the term security has the following meanings: [ cite web|url=http://www.its.bldrdoc.gov/fs-1037/dir-032/_4740.htm |title=security |accessdate=2007-10-14 |coauthors=Institute for Telecomunications Sciences |work=Federal Standard 1037C |publisher=Institute for Telecomunications Sciences ]

* A condition that results from the establishment and maintenance of protective measures that ensure a state of inviolability from hostile acts or influences.
* With respect to classified matter, the condition that prevents unauthorized persons from having access to official information that is safeguarded in the interests of national security.
* Measures taken by a military unit, an activity or installation to protect itself against all acts designed to, or which may, impair its effectiveness.

Security has to be compared and contrasted with other related concepts: Safety, , reliability. The key difference between security and reliability is that security must take into account the actions of active malicious agents attempting to cause destruction.

Perceived security compared to real security

It is very often true that people's perception of security is not directly related to actual security. For example, a fear of flying is much more common than a fear of driving; however, driving is generally a much more dangerous form of transport. The tool may be mistaken for the effect, for example when multiple computer security programs interfere with each other, the user assumes the computer is secure when actual security has vanished.

Another side of this is a phenomenon called security theatre where ineffective security measures such as screening of airline passengers based on static databases are introduced with little real increase in security or even, according to the critics of one such measure - Computer Assisted Passenger Prescreening System - with an actual "decrease" in real security.

Additionally, however, sometimes if it is perceived that there is security then there will be an increase in actual security, even if the perception of security is mistaken. Sometimes a sign may warn that video surveillance is covering an area, and even if there is no actual visual surveillance then some malicious agents will be deterred by the belief that there may be. Also, often when there "is" actual security present in an area, such as video surveillance, an alarm system in a home, or an anti-theft system in a car such as a LoJack, signs advertising this security will increase its effectiveness, protecting the value of the secured vehicle or area itself. Since some intruders will decide not to attempt to break into such areas or vehicles, there can actually be less damage to windows in addition to protection of valuable objects inside. Without such advertisement, a car-thief might, for example, approach a car, break the window, and then flee in response to an alarm being triggered. Either way, perhaps the car itself and the objects inside aren't stolen, but with "perceived security" even the windows of the car have a lower chance of being damaged, increasing the financial security of its owner(s). It is important, however, for signs advertising security not to give clues as to how to subvert that security, for example in the case where a home burglar might be more likely to break into a certain home if he or she is able to learn beforehand which company makes its security system.Types of securities

Categorising security

There is an immense literature on the analysis and categorisation of security. Part of the reason for this is that, in most security systems, the "weakest link in the chain" is the most important. The situation is asymmetric since the "defender" must cover all points of attack while the attacker need only identify a single weak point upon which to concentrate.

Types of security

IT realm

* Computing security
* Data security
* Application security
* Information security
* Network security

Physical realm

* Physical security
* Shopping centre security
* Airport security
* Food security
* Home security
* Cargo security

Political

* International security
* National security
* Human security
* Homeland security
* Public security

Monetary

* Financial security

Aviation Security is a combination of measures and material and human resources intended to counter the unlawful interference with the aviation security.

Security concepts

Certain concepts recur throughout different fields of security.

* Risk - a risk is a possible event which could cause a loss
* Threat - a threat is a method of triggering a risk event that is dangerous
* Vulnerability - a weakness in a target that can potentially be exploited by a threat
* Exploit - a vulnerability that has been triggered by a threat - a risk of 1.0 (100%)
* Countermeasure - a countermeasure is a way to stop a threat from triggering a risk event
* Defense in depth - never rely on one single security measure alone
* Assurance - assurance is the level of guarantee that a security system will behave as expected

Security management in organizations

In the corporate world, various aspects of security were historically addressed separately - notably by distinct and often noncommunicating departments for IT security, physical security, and fraud prevention. Today there is a greater recognition of the interconnected nature of security requirements, an approach variously known as holistic security, "all hazards" management, and other terms. Inciting factors in the convergence of security disciplines include the development of digital video surveillance technologies (see Professional video over IP) and the digitization and networking of physical control systems (see SCADA) [ [http://www.csoonline.com/read/090402/beast.html Taming the Two-Headed Beast] , CSOonline, September 2002] [ [http://www.csoonline.com/read/041505/constellation.html Security 2.0] , CSOonline, April 2005] . Greater interdisciplinary cooperation is further evidenced by the February 2005 creation of the Alliance for Enterprise Security Risk Management, a joint venture including leading associations in security (ASIS), information security (ISSA, the Information Systems Security Association), and IT audit (ISACA, the Information Systems Audit and Control Association) [ [http://www.aesrm.org/ AESRM Website] ] .

IT Security standards

* ISO/IEC 15443 A framework for IT security assurance (covering many methods, i.e. TCSEC, Common Criteria, ISO/IEC 17799)
** [http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=39733 ISO/IEC 15443-1: Overview and framework]
** [http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=39271 ISO/IEC 15443-2: Assurance methods]
** [http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=41693 ISO/IEC 15443-3: Analysis of assurance methods]
* [http://www.iso.org/iso/en/CombinedQueryResult.CombinedQueryResult?queryString=15408 ISO/IEC 15408] refer also to Common Criteria
* [http://www.iso.org/iso/en/CatalogueDetailPage.CatalogueDetail?CSNUMBER=39612&ICS1=35&ICS2=40&ICS3= ISO/IEC 17799:2005 Code of practice for information security management] refer also to ISO/IEC 17799

* refer also to TCSEC Trusted Computer System Evaluation Criteria (Orange Book)

Security experts

Computer Security experts

* Ross J. Anderson
* Dan Geer
* Bruce Schneier
* Andrew Odlyzko
* Joseph MageeSee also cryptography and economics of security.

National Security experts

* Richard A. Clarke
* David H. Holtzman

See also the listing of experts at the Belfer Center for Science and International Affairs and in the national security entry.

See also

Concepts

* 3D Security
* Surveillance
** Wireless sensor network
* Insecurity
* Insurance
* Classified information
* Security breach
* List of System Quality Attributes
* Right-financing

Branches

* National security
* Human security
* Information security
** CISSP
* Computer security
** Hacking
** Cracking
** Phreaking
* Communications security
* Physical Security
** Police
** Public Security Bureau
*** Security guard
*** Security police
*** Search

References


Wikimedia Foundation. 2010.

Игры ⚽ Нужно решить контрольную?
Synonyms:

Look at other dictionaries:

  • security — se·cur·i·ty /si kyu̇r ə tē/ n pl ties 1 a: something (as a mortgage or collateral) that is provided to make certain the fulfillment of an obligation used his property as security for a loan b: surety see also …   Law dictionary

  • security — [si kyoor′ə tē] n. pl. securities [ME securite < L securitas < securus: see SECURE] 1. the state of being or feeling secure; freedom from fear, anxiety, danger, doubt, etc.; state or sense of safety or certainty 2. something that gives or… …   English World dictionary

  • Security — Se*cu ri*ty, n.; pl. {Securities}. [L. securitas: cf. F. s[ e]curit[ e]. See {Secure}, and cf. {Surety}.] 1. The condition or quality of being secure; secureness. Specifically: (a) Freedom from apprehension, anxiety, or care; confidence of power… …   The Collaborative International Dictionary of English

  • security — Something given or pledged to a person who is lending money in order to secure or guarantee payment of that debt. (Dictionary of Canadian Bankruptcy Terms) Under Title 11 U.S.C. Section 101: (49) The term security (A) includes (i) note; (ii)… …   Glossary of Bankruptcy

  • Security — Widefield, CO U.S. Census Designated Place in Colorado Population (2000): 29845 Housing Units (2000): 10177 Land area (2000): 14.522255 sq. miles (37.612466 sq. km) Water area (2000): 0.493456 sq. miles (1.278046 sq. km) Total area (2000):… …   StarDict's U.S. Gazetteer Places

  • Security, CO — Security Widefield, CO U.S. Census Designated Place in Colorado Population (2000): 29845 Housing Units (2000): 10177 Land area (2000): 14.522255 sq. miles (37.612466 sq. km) Water area (2000): 0.493456 sq. miles (1.278046 sq. km) Total area… …   StarDict's U.S. Gazetteer Places

  • security — (n.) mid 15c., condition of being secure, from L. securitas, from securus (see SECURE (Cf. secure)). Meaning freedom from care is from 1550s; that of something which secures is from 1580s; safety of a state, person, etc. is from 1941. Legal sense …   Etymology dictionary

  • security — [n1] safety, protection aegis, agreement, armament, armor, asylum, bail, bond, care, collateral, compact, contract, covenant, cover, custody, defense, earnest, freedom, guarantee, guard, immunity, insurance, pact, pawn, pledge, precaution,… …   New thesaurus

  • security — surety, guaranty, *guarantee, bond, bail Analogous words: *pledge, earnest, token …   New Dictionary of Synonyms

  • security — ► NOUN (pl. securities) 1) the state of being or feeling secure. 2) the safety of a state or organization against criminal activity such as terrorism or espionage. 3) a thing deposited or pledged as a guarantee of the fulfilment of an undertaking …   English terms dictionary

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”