Вы находитесь на странице: 1из 4

Security

For other uses, see Security (disambiguation).


Security is the degree of resistance to, or protection

Security checkpoint at the entrance to the Delta Air Lines


corporate headquarters in Atlanta

alogue needs military equipment, armies, or police. Positive dialogue needs social capital, education, or social
interaction.[2]

X-ray machines and metal detectors are used to control what is


allowed to pass through an airport security perimeter.

1 Perceived security compared to


real security
Perception of security may be poorly mapped to measurable objective security. For example, the fear of earthquakes has been reported to be more common than the
fear of slipping on the bathroom oor although the latter kills many more people than the former.[3] Similarly,
the perceived eectiveness of security measures is sometimes dierent from the actual security provided by those
measures. The presence of security protections may even
be taken for the safety itself. For example, two computer
security programs could be interfering with each other
and even canceling each others eect, while the owner
believes s/he is getting double the protection.

Security spikes protect a gated community in the East End of London.

from, harm. It applies to any vulnerable and valuable as- Security theater is a critical term for deployment of measet, such as a person, dwelling, community, item, nation, sures primarily aimed at raising subjective security withor organization.
out a genuine or commensurate concern for the eects
As noted by the Institute for Security and Open Method- of that action on real safety. For example, some conologies (ISECOM) in the OSSTMM 3, security pro- sider the screening of airline passengers based on static
vides a form of protection where a separation is cre- databases to have been Security theater and the Computer
ated between the assets and the threat. These separations Assisted Passenger Prescreening System to have created
are generically called controls, and sometimes include a decrease in objective security.
changes to the asset or the threat.[1]
Perception of security can increase objective security
Security is said to have two dialogues. Negative dia- when it aects or deters malicious behavior, as with vilogue is about danger, risk, threat etc. Positive dialogue sual signs of security protections, such as video surveilis about opportunities, interests, prots etc. Negative di- lance, alarm systems in a home, or an anti-theft system in
1

a car such as a vehicle tracking system or warning sign.


Since some intruders will decide not to attempt to break
into such areas or vehicles, there can be less damage to
windows in addition to protection of valuable objects inside. Without such advertisement, an intruder might, for
example, approach a car, break the window, and then ee
in response to an alarm being triggered. Either way, perhaps the car itself and the objects inside aren't stolen, but
with perceived security even the windows of the car have
a lower chance of being damaged.

Categorizing security

There is an immense literature on the analysis and categorization of security. Part of the reason for this is that,
in most security systems, the weakest link in the chain
is the most important. The situation is asymmetric since
the 'defender' must cover all points of attack while the attacker need only identify a single weak point upon which
to concentrate.
Operations Security (OPSEC) is a complement to
other traditional security measures that evaluates
the organization from an adversarial perspective.[4]

Security concepts

Certain concepts recur throughout dierent elds of security:

SECURITY MANAGEMENT IN ORGANIZATIONS

security practices. The hardware would be the doors,


locks, alarm systems, lighting that is installed on your
property. Personal security practices would be ensuring
doors are locked, alarms activated, windows closed and
many other routine tasks which act to prevent a burglary.

5 Computer security
Computer security, also known as cybersecurity or IT
security, is security applied to computing devices such
as computers and smartphones, as well as computer networks such as private and public networks, including
the whole Internet. The eld includes all ve components: hardware, software, data, people, and procedures
by which digital equipment, information and services
are protected from unintended or unauthorized access,
change or destruction, and is of growing importance due
to the increasing reliance of computer systems in most
societies.[5] It includes physical security to prevent theft
of equipment and information security to protect the data
on that equipment. Those terms generally do not refer to
physical security, but a common belief among computer
security experts is that a physical security breach is one of
the worst kinds of security breaches as it generally allows
full access to both data and equipment.

6 Security management in organizations

In the corporate world, various aspects of security are his Assurance - assurance is the level of guarantee that torically addressed separately - notably by distinct and ofa security system will behave as expected
ten noncommunicating departments for IT security, physical security, and fraud prevention. Today there is a
Countermeasure - a countermeasure is a way to stop greater recognition of the interconnected nature of sea threat from triggering a risk event
curity requirements,[6] an approach variously known as
holistic security, all hazards management, and other
Defense in depth - never rely on one single security
terms.
measure alone
Inciting factors in the convergence of security disci Risk - a risk is a possible event which could cause a plines include the development of digital video surveilloss
lance technologies (see Professional video over IP) and
the digitization and networking of physical control sys Threat - a threat is a method of triggering a risk event
tems (see SCADA).[7][8] Greater interdisciplinary coopthat is dangerous
eration is further evidenced by the February 2005 cre Vulnerability - a weakness in a target that can po- ation of the Alliance for Enterprise Security Risk Management, a joint venture including leading associations
tentially be exploited by a security threat
in security (ASIS), information security (ISSA, the In Exploit - a vulnerability that has been triggered by a formation Systems Security Association), and IT audit
threat - a risk of 1.0 (100%)
(ISACA, the Information Systems Audit and Control Association).
In 2007 the International Organisation for Standardization (ISO) released ISO 28000 - Security Management
Systems for the supply chain. Although the title supply
Home security is something applicable to all of us and in- chain is included, this Standard species the requirements
volves the hardware in place on a property, and personal for a security management system, including those as-

Home security

3
pects critical to security assurance for any organisation
or enterprise wishing to manage the security of the organisation and its activities. ISO 28000 is the foremost
risk based security system and is suitable for managing
both public and private regulatory security, customs and
industry based security schemes and requirements.

See also
Safety

7.1

Concepts

3D Security
Classied information
Dynamics Security
Insecurity
ISO 27000
ISO 28000
ISO 31000
Security increase
Security Risk
Surveillance
Wireless sensor network

7.2

Branches

Computer security
Cracking
Hacking
MySecureCyberspace
Phreaking
Communications security
Human security
Information security
CISSP
National security
Physical security
Police
Public Security Bureau
Security guard

8 References
[1] ISECOM - Open Source Security Testing Methodology
Manual (OSSTMM)". Retrieved 20 September 2014.
[2] Navidnia, Manijeh (2009). Societal Security. Iran,Tehran:
Research Institute of Strategic Studies (Rahbordi). pp.
2529. ISBN 978-600-5282-12-2.
[3] Bruce Schneier, Beyond Fear: Thinking about Security in
an Uncertain World, Copernicus Books, pages 26-27
[4] OSPA. The Operations Security Professionals
Association- OPSEC Training, tools and Awareness.
Opsecprofessionals.org. Retrieved 2012-09-30.
[5] Reliance spells end of road for ICT amateurs, May 07,
2013, The Australian
[6] Security in a Changing Landscape. Dell.com. Retrieved
2012-03-27.
[7] Taming the Two-Headed Beast, CSOonline, September
2002
[8] Security 2.0, CSOonline, April 2005

9 External links
Special research project 'Dynamics of Security'
Dynamiken der Sicherheit. Formen der Versicherheitlichung in historischer Perspektive.

10

10
10.1

TEXT AND IMAGE SOURCES, CONTRIBUTORS, AND LICENSES

Text and image sources, contributors, and licenses


Text

Security Source: https://en.wikipedia.org/wiki/Security?oldid=744092305 Contributors: WojPob, The Anome, Koyaanis Qatsi, Enchanter,
Heron, Hephaestos, Edward, Patrick, Michael Hardy, Kku, Mic, Dori, Pagingmrherman, Ahoerstemeier, Ronz, BigFatBuddha, Julesd, Andrewman327, WhisperToMe, DJ Clayworth, Tempshill, Chrisbrown, Joy, Mackensen, Cncs wikipedia, Robbot, ChrisO~enwiki, Moriori,
Jmabel, Steeev, Roscoe x, Pengo, DocWatson42, MathKnight, Revth, Brockert, Tinidril, Antandrus, Beland, Quarl, Mozzerati, KarlHenner, Brianjd, Jpg, Cacycle, ArnoldReinhold, Aranel, RoyBoy, Causa sui, JRM, Smalljim, Matt Britt, Maurreen, Minghong, Pearle,
Poli, Storm Rider, Alansohn, M7, Kurieeto, Suruena, HenkvD, Docboat, H2g2bob, W7KyzmJt, Drbreznjev, Woohookitty, Uncle G,
Commander Keane, Bennetto, Davidfstr, Eras-mus, Gerbrant, Sinar~enwiki, Fcoulter, Sj, Wikix, DeadlyAssassin, MZMcBride, Vegaswikian, Bhadani, SNIyer12, CCRoxtar, FlaBot, Old Moonraker, Gurch, Common Man, Imnotminkus, Coolhawks88, DVdm, Dzzl,
VolatileChemical, Abby724, UkPaolo, Sceptre, Muchness, Backburner001, Peter S., Stephenb, Cryptic, Draeco, Wiki alf, Grafen, AlMac, Irishguy, Nick, Toddgee, Wsiegmund, Exit2DOS2000, Luk, DocendoDiscimus, Veinor, SmackBot, Reedy, Ominae, Londonlinks,
Yamaguchi , Ohnoitsjamie, Kazkaskazkasako, Oli Filth, ERobson, Kungming2, Jmax-, Dethme0w, Frap, CelebritySecurity, Yidisheryid, COMPFUNK2, Derek R Bullamore, Weregerbil, DMacks, Rory096, Kuru, JHunterJ, Stupid Corn, Beetstra, Jadams76, Yaxh,
Jose77, Ice-Evil, Levineps, Iridescent, Astharoth1, Shoeofdeath, Sander Sde, Courcelles, SkyWalker, Wafulz, Andrewia, Iceturf, AshLin,
HerveB~enwiki, ShelfSkewed, Nnp, Mapletip, Gogo Dodo, ST47, Biblbroks, Maziotis, Spineofgod, Mojo Hand, Mentisto, AntiVandalBot, Luna Santin, Dbrodbeck, Marokwitz, Prolog, Barek, MER-C, Tqbf, SiobhanHansa, Magioladitis, VoABot II, JamesBWatson,
JohnLai, Havanafreestone, JaGa, Klf uk, Jim.henderson, Uvainio, Kostisl, R'n'B, CommonsDelinker, J.delanoy, Dbiel, WarthogDemon,
Reedy Bot, Touch Of Light, Shoman93, JHeinonen, BigHairRef, Idioma-bot, Technowonk, Je G., TheMindsEye, Bsroiaadn, Touchingwater, Philip Trueman, Mercy, Perohanych, HansWDaniel, Qxz, Jackfork, Wiae, Meters, Altermike, Kbrose, K. Annoyomous, Bob
Costello, Moonriddengirl, Derekcslater, Caltas, Lucca.Ghidoni, Flyer22 Reborn, Oda Mari, Oxymoron83, Corp Vision, Spitre19, Correogsk, Disooqi, Hariva, Pinkadelica, Martarius, ClueBot, The Thing That Should Not Be, Ark2120, Unbuttered Parsnip, Drmies, Sushilover
boy, Nesberries, Lartoven, Heyta, SchreiberBike, DanielPharos, Aitias, PCHS-NJROTC, Portal60hooch, XLinkBot, Timschocker, Rror,
SilvonenBot, Loganmstarr, Exegete48, Lakerfan48, Addbot, Adamylo, WeatherFug, TutterMouse, Fieldday-sunday, MrOllie, Latiligence,
DreamHaze, OsBlink, Tide rolls, Luckas Blade, Exegetetheology, PlankBot, Electronicommerce, Yobot, Fraggle81, Andyj00, Onyx020,
Kcmoduk, Angel ivanov angelov, Orion11M87, AnomieBOT, Andrewrp, Galoubet, JungleJym2, ChristopheS, Materialscientist, RevelationDirect, GB fan, Neurolysis, Mlduda, Bihco, Mysecurecyberspace, Zoom-Arrow, EFE YILDIRIM, Alvin Seville, Tulocci, Joxemai,
Voltov45, Jakejo2009, Track1200, Spasioc, Untchable, Isecom, Laaa200, Oczwap, I dream of horses, Burrettwilce, Serols, SpaceFlight89,
Mentmic, Meaghan, Supergreg no1, Reconsider the static, Jonkerz, Lotje, Stopspam4567, Maxlaker, Ragle Fragle 007, Wanne673, Reach
Out to the Truth, T0jikist0ni, Mean as custard, Deagle AP, John of Reading, Nothingmore Nevermore, Winner 42, Dcirovic, We hope,
Redeyeglasses, 2beornot57, Greatread, Netknowle, Staszek Lem, Bosnabosna, L Kensington, Sepersann, RTemero1, ClueBot NG, Jack
Greenmaven, This lousy T-shirt, Thaumatropia, Widr, Matt j fox, Speedster3000, MerlIwBot, BG19bot, MarcMMMason, Aourangzaib,
Lulzity, Alangar Manickam, Facilemindz, Dmaiolo, Contingentsecurity, Scopecreep, Artem12345, Wiki slav, Mr. Guye, Nic Cohen,
RheaceJones, Lugia2453, SFK2, Ofthehighest, Negus 69, MjadenSTEM, Patient Zero, KH-1, Maaxy, Sarac12345, Httpscard, Albozian,
KasparBot, Johngot, Johnhamel04, Lu. Rene, Jjacksonca, Happony, CS104-g8, Khalid Samiltoud, Manijeh Navidnia, A2zbrandon, Jcondes, Micheal345, Unisankar, Three07457, Jamil ur Rehman bazai, Jivi.vasid and Anonymous: 364

10.2

Images

File:Ambox_important.svg Source: https://upload.wikimedia.org/wikipedia/commons/b/b4/Ambox_important.svg License: Public domain Contributors: Own work, based o of Image:Ambox scales.svg Original artist: Dsmurat (talk contribs)
File:Berlin_Schnefeld_Airport_metal_detectors.jpg Source: https://upload.wikimedia.org/wikipedia/commons/f/f7/Berlin_Sch%
C3%B6nefeld_Airport_metal_detectors.jpg License: GFDL Contributors: Own work Original artist: Ralf Roletschek
File:Commons-logo.svg Source: https://upload.wikimedia.org/wikipedia/en/4/4a/Commons-logo.svg License: CC-BY-SA-3.0 Contributors: ? Original artist: ?
File:Delta_World_HQ_-_entrance_with_security_station.JPG Source:
https://upload.wikimedia.org/wikipedia/commons/9/94/
Delta_World_HQ_-_entrance_with_security_station.JPG License: CC BY-SA 3.0 Contributors: Own work Original artist: Mav
File:Edit-clear.svg Source: https://upload.wikimedia.org/wikipedia/en/f/f2/Edit-clear.svg License: Public domain Contributors: The
Tango! Desktop Project. Original artist:
The people from the Tango! project. And according to the meta-data in the le, specically: Andreas Nilsson, and Jakub Steiner (although
minimally).
File:Question_book-new.svg Source: https://upload.wikimedia.org/wikipedia/en/9/99/Question_book-new.svg License: Cc-by-sa-3.0
Contributors:
Created from scratch in Adobe Illustrator. Based on Image:Question book.png created by User:Equazcion Original artist:
Tkgd2007
File:Security_spikes_1.jpg Source: https://upload.wikimedia.org/wikipedia/commons/e/e4/Security_spikes_1.jpg License: Public domain Contributors: Own work Original artist: Edward

10.3

Content license

Creative Commons Attribution-Share Alike 3.0

Вам также может понравиться