digplanet beta 1: Athena
Share digplanet:


Applied sciences






















For other uses, see Security (disambiguation).
X-ray machines and metal detectors are used to control what is allowed to pass through an airport security perimeter.
Security spikes protect a gated community in the East End of London.
Security checkpoint at the entrance to the Delta Air Lines corporate headquarters in Atlanta

Security is the degree of resistance to, or protection from, harm. It applies to any vulnerable and valuable asset, such as a person, dwelling, community, nation, or organization.

As noted by the Institute for Security and Open Methodologies (ISECOM) in the OSSTMM 3, security provides "a form of protection where a separation is created between the assets and the threat." These separations are generically called "controls," and sometimes include changes to the asset or the threat.[1]

Perceived security compared to real security[edit]

Perception of security may be poorly mapped to measureable objective security. For example, the fear of earthquakes has been reported to be more common than the fear of slipping on the bathroom floor although the latter kills many more people than the former.[2] Similarly, the perceived effectiveness of security measures is sometimes different from the actual security provided by those measures. The presence of security protections may even be taken for security itself. For example, two computer security programs could be interfering with each other and even cancelling each other's effect, while the owner believes s/he is getting double the protection.

Security theater is a critical term for deployment of measures primarily aimed at raising subjective security without a genuine or commensurate concern for the effects of that measure on objective security. For example, some consider the screening of airline passengers based on static databases to have been Security Theater and Computer Assisted Passenger Prescreening System to have created a decrease in objective security.

Perception of security can increase objective security when it affects or deters malicious behavior, as with visual signs of security protections, such as video surveillance, alarm systems in a home, or an anti-theft system in a car such as a vehicle tracking system or warning sign. Since some intruders will decide not to attempt to break into such areas or vehicles, there can actually be less damage to windows in addition to protection of valuable objects inside. Without such advertisement, an intruder might, for example, approach a car, break the window, and then flee in response to an alarm being triggered. Either way, perhaps the car itself and the objects inside aren't stolen, but with perceived security even the windows of the car have a lower chance of being damaged.

Categorizing security[edit]

There is an immense literature on the analysis and categorization of security. Part of the reason for this is that, in most security systems, the "weakest link in the chain" is the most important. The situation is asymmetric since the 'defender' must cover all points of attack while the attacker need only identify a single weak point upon which to concentrate.

  • Aviation security is a combination of material and human resources and measures intended to counter unlawful interference with aviation.
  • Operations Security (OPSEC) is a complement to other "traditional" security measures that evaluates the organization from an adversarial perspective.[3]

Security concepts[edit]

Certain concepts recur throughout different fields of security:

  • Assurance - assurance is the level of guarantee that a security system will behave as expected
  • Countermeasure - a countermeasure is a way to stop a threat from triggering a risk event
  • Defense in depth - never rely on one single security measure alone
  • Risk - a risk is a possible event which could cause a loss
  • Threat - a threat is a method of triggering a risk event that is dangerous
  • Vulnerability - a weakness in a target that can potentially be exploited by a security threat
  • Exploit - a vulnerability that has been triggered by a threat - a risk of 1.0 (100%)

Security management in organizations[edit]

In the corporate world, various aspects of security were historically addressed separately - notably by distinct and often noncommunicating departments for IT security, physical security, and fraud prevention. Today there is a greater recognition of the interconnected nature of security requirements,[4] an approach variously known as holistic security, "all hazards" management, and other terms.

Inciting factors in the convergence of security disciplines include the development of digital video surveillance technologies (see Professional video over IP) and the digitization and networking of physical control systems (see SCADA).[5][6] Greater interdisciplinary cooperation is further evidenced by the February 2005 creation of the Alliance for Enterprise Security Risk Management, a joint venture including leading associations in security (ASIS), information security (ISSA, the Information Systems Security Association), and IT audit (ISACA, the Information Systems Audit and Control Association).

In 2007 the International Organisation for Standardization (ISO) released ISO 28000 - Security Management Systems for the supply chain. Although the title supply chain is included, this Standard specifies the requirements for a security management system, including those aspects critical to security assurance for any organisation or enterprise wishing to manage the security of the organisation and its activities. ISO 28000 is the foremost risk based security system and is suitable for managing both public and private regulatory security, customs and industry based security schemes and requirements.

See also[edit]


  1. ^ http://www.osstmm.org
  2. ^ Bruce Schneier, Beyond Fear: Thinking Sensibly about Security in an Uncertain World, Copernicus Books, pages 26-27
  3. ^ OSPA. "The Operations Security Professional's Association- OPSEC Training, tools and Awareness". Opsecprofessionals.org. Retrieved 2012-09-30. 
  4. ^ "Security in a Changing Landscape". Dell.com. Retrieved 2012-03-27. 
  5. ^ Taming the Two-Headed Beast, CSOonline, September 2002
  6. ^ Security 2.0, CSOonline, April 2005

External links[edit]

Original courtesy of Wikipedia: http://en.wikipedia.org/wiki/Security — Please support Wikipedia.
This page uses Creative Commons Licensed content from Wikipedia. A portion of the proceeds from advertising on Digplanet goes to supporting Wikipedia.
1000000 videos foundNext > 

Dangerously Rich Billionaire Super Security 2012 (Part 1/2)

From Warren Buffett's bodyguard to a high-tech panic room in a Hollywood mansion and on board a mega yacht in Miami, CNBC goes behind the scenes with the men...

UN Security Council Media Stakeout Mr Ron Prosor Israel, After UN Decision

UN Security Council Media Stakeout Mr Ron Prosor Israel After UN Decision UN LIVE WEB TV http://webtv.un.org/ http://mediaexpress.reuters.com/content/video/live "Copyright Disclaimer Under...

UN Security Council Calls for Gaza Cease-fire

The U.N. Security Council called for "an immediate and unconditional humanitarian cease-fire" in the Gaza war between Israel and Hamas at an emergency meeting just after midnight Monday morning....

UN security council calls for Gaza truce

The UN security council has called for an 'immediate and unconditional' ceasefire in Gaza. The presidential statement agreed at an emergency session in New York urged Israel and Hamas to accept...

Saharanpur SP: Ample security measures in place for Eid

In an interview with CNN-IBN, Superintendent of Police of Saharanpur said that the curfew would be relaxed if the situation got normal. "There is ample security measures in place for Eid",said SP.

UN Security Council calls for Humanitarian Ceasefire in Gaza

The UN Security Council agreed on a statement on Monday (July 28) urging Israel, Palestinians and Islamist Hamas militants to implement a humanitarian truce beyond the Muslim holiday of Eid...

Abusive Boyfriend With Security Prank (Gone Wrong)

PLEASE SHARE************** Thank you guys for the love! Here is the link of the outtakes video of this prank: http://goo.gl/smZvX5 So I went out...


Direct download link: http://tiiny.me/347396 USB Disk Security 6.2 new USB Disk Security 6.2 netload USB Disk Security 6.2 keygen USB Disk Security 6.2 serial USB Disk Security 6.2...

Download Clean Disk Security 8.0 For Free

Direct download link: http://tiiny.me/347396 Clean Disk Security 8.0 new Clean Disk Security 8.0 netload Clean Disk Security 8.0 keygen Clean Disk Security 8.0 serial Clean Disk Security...

Markovic hits security guard in head

Liverpool's new signing Lazar Markovic's shot was off target against Olympiakos, but he didn't miss the security guard.

1000000 videos foundNext > 

26265609 news items

New York Times

New York Times
Tue, 29 Jul 2014 03:40:24 -0700

HONG KONG — In President Xi Jinping's most audacious move yet to impose his authority by targeting elite corruption, the Communist Party on Tuesday announced an investigation of Zhou Yongkang, the retired former head of domestic security who ...

Wall Street Journal

Wall Street Journal
Mon, 28 Jul 2014 09:25:58 -0700

The findings come in the annual report card from the trustees of Medicare and Social Security. They project Medicare will be able to continue paying full hospital benefits for its elderly or disabled clients without any changes in the law through 2030 ...


Tue, 29 Jul 2014 06:08:09 -0700

NEW YORK--BlackBerry said Tuesday that it will acquire Secusmart, a German mobile security company. The purchase highlights how BlackBerry is doubling down on the enterprise as well as mobile security.


Sun, 27 Jul 2014 21:29:15 -0700

Gaza City (CNN) -- With more than 1,000 people killed in the Israel-Hamas conflict, the U.N. Security Council held an emergency meeting in New York early Monday to push for "an immediate and unconditional humanitarian cease-fire in Gaza." The halt in ...


Mon, 28 Jul 2014 16:15:00 -0700

One of the worst parts about flying is undoubtedly the long, insufferable, tearing-your-hair-out experience that is the security checkpoint line. The TSA knows this and now the agency is asking you for help. The Transportation Security Administration ...

Yahoo News

Yahoo News
Tue, 29 Jul 2014 03:29:01 -0700

BEIJING (Reuters) - China is investigating former domestic security chief Zhou Yongkang, one of the most powerful politicians of the last decade, on suspicion of corruption, the government said on Tuesday, in what could become China's biggest graft ...


Sun, 27 Jul 2014 07:01:06 -0700

Two kayakers who found themselves up Jamaica Bay without a paddle emerged from the water at New York's John F. Kennedy Airport this weekend, drawing summonses for themselves and a bit of embarrassment for airport security. The airport fancies itself ...

International Business Times

Washington Post
Mon, 28 Jul 2014 14:21:24 -0700

“Giving security clearances to individuals who fail to follow the law is unwise and risky,” said Sen. Tom Coburn (R-Okla.), a frequent critic of federal employees who owe taxes. “Federal tax cheats with security clearances jeopardize both our national ...

Oops, we seem to be having trouble contacting Twitter

Talk About Security

You can talk about Security with people all over the world in our discussions.

Support Wikipedia

A portion of the proceeds from advertising on Digplanet goes to supporting Wikipedia. Please add your support for Wikipedia!