Security Explained

Security is protection from, or resilience against, potential harm (or other unwanted coercion). Beneficiaries (technically referents) of security may be persons and social groups, objects and institutions, ecosystems, or any other entity or phenomenon vulnerable to unwanted change. Security mostly refers to protection from hostile forces, but it has a wide range of other senses: for example, as the absence of harm (e.g., freedom from want); as the presence of an essential good (e.g., food security); as resilience against potential damage or harm (e.g. secure foundations); as secrecy (e.g., a secure telephone line); as containment (e.g., a secure room or cell); and as a state of mind (e.g., emotional security).

Security is both a feeling and a state of reality. One can feel secure, while they aren't, but also feel insecure while they are secure. This distinction is usually not very clear to express in the English language.[1]

The term is also used to refer to acts and systems whose purpose may be to provide security (security company, security police, security forces, security service, security agency, security guard, cyber security systems, security cameras, remote guarding). Security can be physical and virtual.

Etymology

The word 'secure' entered the English language in the 16th century. It is derived from Latin securus, meaning freedom from anxiety: se (without) + cura (care, anxiety).[2]

Overview

Referent

A security referent is the focus of a security policy or discourse; for example, a referent may be a potential beneficiary (or victim) of a security policy or system.

Security referents may be persons or social groups, objects, institutions, ecosystems, or any other phenomenon vulnerable to unwanted change by the forces of its environment.[3] The referent in question may combine many referents in the same way that, for example, a nation-state is composed of many individual citizens.[4]

Context

The security context is the relationships between a security referent and its environment. From this perspective, security and insecurity depend first on whether the environment is beneficial or hostile to the referent and also on how capable the referent is of responding to their environment in order to survive and thrive.

Capabilities

The means by which a referent provides for security (or is provided for) vary widely. They include, for example:

Effects

Any action intended to provide security may have multiple effects. For example, an action may have a wide benefit, enhancing security for several or all security referents in the context; alternatively, the action may be effective only temporarily, benefit one referent at the expense of another, or be entirely ineffective or counterproductive.

Contested approaches

Approaches to security are contested and the subject of debate. For example, in debate about national security strategies, some argue that security depends principally on developing protective and coercive capabilities in order to protect the security referent in a hostile environment (and potentially to project that power into its environment, and dominate it to the point of strategic supremacy).[5] [6] [7] Others argue that security depends principally on building the conditions in which equitable relationships can develop, partly by reducing antagonism between actors, ensuring that fundamental needs can be met, and also ensuring that differences of interest can be negotiated effectively.[8] [9]

Security contexts (examples)

The table shows some of the main domains where security concerns are prominent.

Informational

Physical

Political

Monetary

The range of security contexts is illustrated by the following examples (in alphabetical order):

Computer security

See main article: Computer security. Computer security, also known as cybersecurity or IT security, refers to the security of computing devices such as computers and smartphones, as well as computer networks such as private and public networks, and the Internet. The field has growing importance due to the increasing reliance on computer systems in most societies.[10] It concerns the protection of hardware, software, data, people, and also the procedures by which systems are accessed. The means of computer security include the physical security of systems and the security of information held on them.

Corporate security

See main article: Corporate security. Corporate security refers to the resilience of corporations against espionage, theft, damage, and other threats. The security of corporations has become more complex as reliance on IT systems has increased, and their physical presence has become more highly distributed across several countries, including environments that are, or may rapidly become, hostile to them.

Environmental security

See main article: Environmental security. Environmental security, also known as ecological security, refers to the integrity of ecosystems and the biosphere, particularly in relation to their capacity to sustain a diversity of life-forms (including human life). The security of ecosystems has attracted greater attention as the impact of ecological damage by humans has grown.[11]

Food security

See main article: Food security. Food security refers to the ready supply of, and access to, safe and nutritious food.[12] Food security is gaining in importance as the world's population has grown and productive land has diminished through overuse and climate change.[13] [14]

Home security

See main article: Home security. Home security normally refers to the security systems used on a property used as a dwelling (commonly including doors, locks, alarm systems, lighting, fencing); and personal security practices (such as ensuring doors are locked, alarms are activated, windows are closed etc.)

Human security

See main article: Human security. Human security is an emerging paradigm that, in response to traditional emphasis on the right of nation-states to protect themselves,[15] has focused on the primacy of the security of people (individuals and communities).[16] The concept is supported by the United Nations General Assembly, which has stressed "the right of people to live in freedom and dignity" and recognized "that all individuals, in particular vulnerable people, are entitled to freedom from fear and freedom from want".[17]

Information security

See main article: Information security. Information security refers to the security of information in any form. Spoken, written, digital, networked, technological, and procedural forms of information are all examples that may be covered in an information security management scheme. Computer security, IT security, ICT security, and network security are thus all subdomains of information security.[18]

National security

See main article: National security. National security refers to the security of a nation-state, including its people, economy, and institutions. In practice, state governments rely on a wide range of means, including diplomacy, economic power, and military capabilities.

Security concepts (examples)

Certain concepts recur throughout different fields of security:

Perceptions of security

Since it is not possible to know with precision the extent to which something is 'secure' (and a measure of vulnerability is unavoidable), perceptions of security vary, often greatly. For example, a fear of death by earthquake is common in the United States (US), but slipping on the bathroom floor kills more people;[19] and in France, the United Kingdom, and the US, there are far fewer deaths caused by terrorism than there are women killed by their partners in the home.[20] [21] [22] [23]

Another problem of perception is the common assumption that the mere presence of a security system (such as armed forces or antivirus software) implies security. For example, two computer security programs installed on the same device can prevent each other from working properly, while the user assumes that he or she benefits from twice the protection that only one program would afford.

Security theater is a critical term for measures that change perceptions of security without necessarily affecting security itself. For example, visual signs of security protections, such as a home that advertises its alarm system, may deter an intruder, whether or not the system functions properly. Similarly, the increased presence of military personnel on the streets of a city after a terrorist attack may help to reassure the public, whether or not it diminishes the risk of further attacks.

See also

Notes and References

  1. News: Schneier . Bruce . Bruce Schneier . The Difference Between Feeling and Reality in Security . 2024-05-06 . Wired . en-US . 1059-1028.
  2. Web site: Origin and meaning of secure. Online Etymology Dictionary. etymonline.com. en. 2017-12-17.
  3. Barry Buzan, Ole Wæver, and Jaap de Wilde, Security: A New Framework for Analysis (Boulder: Lynne Rienner Publishers, 1998), p. 32
  4. Web site: Rethinking Security: A discussion paper. https://ghostarchive.org/archive/20221009/https://rethinkingsecurityorguk.files.wordpress.com/2016/10/rethinking-security-a-discussion-paper.pdf . 2022-10-09 . live. Gee. D. 2016. rethinkingsecurity.org.uk. Ammerdown Group. 2017-12-17.
  5. Web site: Joint Vision 2020 Emphasizes Full-spectrum Dominance. US, Department of Defense. 2000. archive.defense.gov. en. 2017-12-17.
  6. Web site: Re-thinking defence to meet new threats. House of Commons Defence Committee. 2015. publications.parliament.uk. 2017-12-17.
  7. Web site: Building a British military fit for future challenges rather than past conflicts. General Sir Nicholas Houghton. 2015. gov.uk. en. 2017-12-17.
  8. News: Peace Through Shared Security. FCNL. 2015. 2017-12-17. en.
  9. Book: Rogers, P. Losing control : global security in the twenty-first century. 2010. Pluto Press. 9780745329376. 3rd. London. 658007519.
  10. http://www.theaustralian.com.au/technology/opinion/reliance-spells-end-of-road-for-ict-amateurs/story-e6frgb0o-1226636267865?nk=34fe4ab684629535daaf6a8fe6e6ef3d "Reliance spells end of road for ICT amateurs"
  11. Web site: Resolution adopted by the General Assembly on 20 December 2010. United Nations General Assembly. 2010. un.org. 2017-12-17.
  12. News: Hunger and food security. United Nations. United Nations Sustainable Development. 2017-12-17. en-US.
  13. Web site: Greater focus on soil health needed to feed a hungry planet. Food and Agriculture Organization. 2013. fao.org. en. 2017-12-17.
  14. News: Only 60 Years of Farming Left If Soil Degradation Continues. Arsenault. C. 2014. Scientific American. 2017-12-17. en.
  15. Web site: Charter of the United Nations, Chapter VII. United Nations. 1945. un.org. en. 2017-12-17.
  16. Web site: UN Trust Fund for Human Security. United Nations. un.org. en. 2017-12-17.
  17. Web site: Resolution adopted by the General Assembly 60/1: World Summit Outcome. https://ghostarchive.org/archive/20221009/http://www.ifrc.org/docs/idrl/I520EN.pdf . 2022-10-09 . live. United Nations General Assembly. 2005. 2017-12-17.
  18. Book: Newsome, Bruce . A Practical Introduction to Security and Risk Management . 2013 . SAGE Publications . 1483313409.
  19. Bruce Schneier, Beyond Fear: Thinking about Security in an Uncertain World, Copernicus Books, pages 26–27
  20. Web site: The Terrorism Acts in 2011. https://ghostarchive.org/archive/20221009/https://terrorismlegislationreviewer.independent.gov.uk/wp-content/uploads/2013/04/report-terrorism-acts-2011.pdf . 2022-10-09 . live. David Anderson QC. 2012. 2017-12-17.
  21. News: What is femicide?. Women's Aid. 2017-12-17. en-GB.
  22. News: Don't Believe In The War On Women? Would A Body Count Change Your Mind?. Upworthy. 2017-12-17. en.
  23. News: Violences conjugales: 118 femmes tuées en 2014. Libération.fr. 2017-12-17. fr.