Académique Documents
Professionnel Documents
Culture Documents
alogue needs military equipment, armies, or police. Positive dialogue needs social capital, education, or social
interaction.[2]
from, harm. It applies to any vulnerable and valuable as- Security theater is a critical term for deployment of measet, such as a person, dwelling, community, item, nation, sures primarily aimed at raising subjective security withor organization.
out a genuine or commensurate concern for the eects
As noted by the Institute for Security and Open Method- of that action on real safety. For example, some conologies (ISECOM) in the OSSTMM 3, security pro- sider the screening of airline passengers based on static
vides a form of protection where a separation is cre- databases to have been Security theater and the Computer
ated between the assets and the threat. These separations Assisted Passenger Prescreening System to have created
are generically called controls, and sometimes include a decrease in objective security.
changes to the asset or the threat.[1]
Perception of security can increase objective security
Security is said to have two dialogues. Negative dia- when it aects or deters malicious behavior, as with vilogue is about danger, risk, threat etc. Positive dialogue sual signs of security protections, such as video surveilis about opportunities, interests, prots etc. Negative di- lance, alarm systems in a home, or an anti-theft system in
1
Categorizing security
There is an immense literature on the analysis and categorization of security. Part of the reason for this is that,
in most security systems, the weakest link in the chain
is the most important. The situation is asymmetric since
the 'defender' must cover all points of attack while the attacker need only identify a single weak point upon which
to concentrate.
Operations Security (OPSEC) is a complement to
other traditional security measures that evaluates
the organization from an adversarial perspective.[4]
Security concepts
5 Computer security
Computer security, also known as cybersecurity or IT
security, is security applied to computing devices such
as computers and smartphones, as well as computer networks such as private and public networks, including
the whole Internet. The eld includes all ve components: hardware, software, data, people, and procedures
by which digital equipment, information and services
are protected from unintended or unauthorized access,
change or destruction, and is of growing importance due
to the increasing reliance of computer systems in most
societies.[5] It includes physical security to prevent theft
of equipment and information security to protect the data
on that equipment. Those terms generally do not refer to
physical security, but a common belief among computer
security experts is that a physical security breach is one of
the worst kinds of security breaches as it generally allows
full access to both data and equipment.
In the corporate world, various aspects of security are his Assurance - assurance is the level of guarantee that torically addressed separately - notably by distinct and ofa security system will behave as expected
ten noncommunicating departments for IT security, physical security, and fraud prevention. Today there is a
Countermeasure - a countermeasure is a way to stop greater recognition of the interconnected nature of sea threat from triggering a risk event
curity requirements,[6] an approach variously known as
holistic security, all hazards management, and other
Defense in depth - never rely on one single security
terms.
measure alone
Inciting factors in the convergence of security disci Risk - a risk is a possible event which could cause a plines include the development of digital video surveilloss
lance technologies (see Professional video over IP) and
the digitization and networking of physical control sys Threat - a threat is a method of triggering a risk event
tems (see SCADA).[7][8] Greater interdisciplinary coopthat is dangerous
eration is further evidenced by the February 2005 cre Vulnerability - a weakness in a target that can po- ation of the Alliance for Enterprise Security Risk Management, a joint venture including leading associations
tentially be exploited by a security threat
in security (ASIS), information security (ISSA, the In Exploit - a vulnerability that has been triggered by a formation Systems Security Association), and IT audit
threat - a risk of 1.0 (100%)
(ISACA, the Information Systems Audit and Control Association).
In 2007 the International Organisation for Standardization (ISO) released ISO 28000 - Security Management
Systems for the supply chain. Although the title supply
Home security is something applicable to all of us and in- chain is included, this Standard species the requirements
volves the hardware in place on a property, and personal for a security management system, including those as-
Home security
3
pects critical to security assurance for any organisation
or enterprise wishing to manage the security of the organisation and its activities. ISO 28000 is the foremost
risk based security system and is suitable for managing
both public and private regulatory security, customs and
industry based security schemes and requirements.
See also
Safety
7.1
Concepts
3D Security
Classied information
Dynamics Security
Insecurity
ISO 27000
ISO 28000
ISO 31000
Security increase
Security Risk
Surveillance
Wireless sensor network
7.2
Branches
Computer security
Cracking
Hacking
MySecureCyberspace
Phreaking
Communications security
Human security
Information security
CISSP
National security
Physical security
Police
Public Security Bureau
Security guard
8 References
[1] ISECOM - Open Source Security Testing Methodology
Manual (OSSTMM)". Retrieved 20 September 2014.
[2] Navidnia, Manijeh (2009). Societal Security. Iran,Tehran:
Research Institute of Strategic Studies (Rahbordi). pp.
2529. ISBN 978-600-5282-12-2.
[3] Bruce Schneier, Beyond Fear: Thinking about Security in
an Uncertain World, Copernicus Books, pages 26-27
[4] OSPA. The Operations Security Professionals
Association- OPSEC Training, tools and Awareness.
Opsecprofessionals.org. Retrieved 2012-09-30.
[5] Reliance spells end of road for ICT amateurs, May 07,
2013, The Australian
[6] Security in a Changing Landscape. Dell.com. Retrieved
2012-03-27.
[7] Taming the Two-Headed Beast, CSOonline, September
2002
[8] Security 2.0, CSOonline, April 2005
9 External links
Special research project 'Dynamics of Security'
Dynamiken der Sicherheit. Formen der Versicherheitlichung in historischer Perspektive.
10
10
10.1
Security Source: https://en.wikipedia.org/wiki/Security?oldid=744092305 Contributors: WojPob, The Anome, Koyaanis Qatsi, Enchanter,
Heron, Hephaestos, Edward, Patrick, Michael Hardy, Kku, Mic, Dori, Pagingmrherman, Ahoerstemeier, Ronz, BigFatBuddha, Julesd, Andrewman327, WhisperToMe, DJ Clayworth, Tempshill, Chrisbrown, Joy, Mackensen, Cncs wikipedia, Robbot, ChrisO~enwiki, Moriori,
Jmabel, Steeev, Roscoe x, Pengo, DocWatson42, MathKnight, Revth, Brockert, Tinidril, Antandrus, Beland, Quarl, Mozzerati, KarlHenner, Brianjd, Jpg, Cacycle, ArnoldReinhold, Aranel, RoyBoy, Causa sui, JRM, Smalljim, Matt Britt, Maurreen, Minghong, Pearle,
Poli, Storm Rider, Alansohn, M7, Kurieeto, Suruena, HenkvD, Docboat, H2g2bob, W7KyzmJt, Drbreznjev, Woohookitty, Uncle G,
Commander Keane, Bennetto, Davidfstr, Eras-mus, Gerbrant, Sinar~enwiki, Fcoulter, Sj, Wikix, DeadlyAssassin, MZMcBride, Vegaswikian, Bhadani, SNIyer12, CCRoxtar, FlaBot, Old Moonraker, Gurch, Common Man, Imnotminkus, Coolhawks88, DVdm, Dzzl,
VolatileChemical, Abby724, UkPaolo, Sceptre, Muchness, Backburner001, Peter S., Stephenb, Cryptic, Draeco, Wiki alf, Grafen, AlMac, Irishguy, Nick, Toddgee, Wsiegmund, Exit2DOS2000, Luk, DocendoDiscimus, Veinor, SmackBot, Reedy, Ominae, Londonlinks,
Yamaguchi , Ohnoitsjamie, Kazkaskazkasako, Oli Filth, ERobson, Kungming2, Jmax-, Dethme0w, Frap, CelebritySecurity, Yidisheryid, COMPFUNK2, Derek R Bullamore, Weregerbil, DMacks, Rory096, Kuru, JHunterJ, Stupid Corn, Beetstra, Jadams76, Yaxh,
Jose77, Ice-Evil, Levineps, Iridescent, Astharoth1, Shoeofdeath, Sander Sde, Courcelles, SkyWalker, Wafulz, Andrewia, Iceturf, AshLin,
HerveB~enwiki, ShelfSkewed, Nnp, Mapletip, Gogo Dodo, ST47, Biblbroks, Maziotis, Spineofgod, Mojo Hand, Mentisto, AntiVandalBot, Luna Santin, Dbrodbeck, Marokwitz, Prolog, Barek, MER-C, Tqbf, SiobhanHansa, Magioladitis, VoABot II, JamesBWatson,
JohnLai, Havanafreestone, JaGa, Klf uk, Jim.henderson, Uvainio, Kostisl, R'n'B, CommonsDelinker, J.delanoy, Dbiel, WarthogDemon,
Reedy Bot, Touch Of Light, Shoman93, JHeinonen, BigHairRef, Idioma-bot, Technowonk, Je G., TheMindsEye, Bsroiaadn, Touchingwater, Philip Trueman, Mercy, Perohanych, HansWDaniel, Qxz, Jackfork, Wiae, Meters, Altermike, Kbrose, K. Annoyomous, Bob
Costello, Moonriddengirl, Derekcslater, Caltas, Lucca.Ghidoni, Flyer22 Reborn, Oda Mari, Oxymoron83, Corp Vision, Spitre19, Correogsk, Disooqi, Hariva, Pinkadelica, Martarius, ClueBot, The Thing That Should Not Be, Ark2120, Unbuttered Parsnip, Drmies, Sushilover
boy, Nesberries, Lartoven, Heyta, SchreiberBike, DanielPharos, Aitias, PCHS-NJROTC, Portal60hooch, XLinkBot, Timschocker, Rror,
SilvonenBot, Loganmstarr, Exegete48, Lakerfan48, Addbot, Adamylo, WeatherFug, TutterMouse, Fieldday-sunday, MrOllie, Latiligence,
DreamHaze, OsBlink, Tide rolls, Luckas Blade, Exegetetheology, PlankBot, Electronicommerce, Yobot, Fraggle81, Andyj00, Onyx020,
Kcmoduk, Angel ivanov angelov, Orion11M87, AnomieBOT, Andrewrp, Galoubet, JungleJym2, ChristopheS, Materialscientist, RevelationDirect, GB fan, Neurolysis, Mlduda, Bihco, Mysecurecyberspace, Zoom-Arrow, EFE YILDIRIM, Alvin Seville, Tulocci, Joxemai,
Voltov45, Jakejo2009, Track1200, Spasioc, Untchable, Isecom, Laaa200, Oczwap, I dream of horses, Burrettwilce, Serols, SpaceFlight89,
Mentmic, Meaghan, Supergreg no1, Reconsider the static, Jonkerz, Lotje, Stopspam4567, Maxlaker, Ragle Fragle 007, Wanne673, Reach
Out to the Truth, T0jikist0ni, Mean as custard, Deagle AP, John of Reading, Nothingmore Nevermore, Winner 42, Dcirovic, We hope,
Redeyeglasses, 2beornot57, Greatread, Netknowle, Staszek Lem, Bosnabosna, L Kensington, Sepersann, RTemero1, ClueBot NG, Jack
Greenmaven, This lousy T-shirt, Thaumatropia, Widr, Matt j fox, Speedster3000, MerlIwBot, BG19bot, MarcMMMason, Aourangzaib,
Lulzity, Alangar Manickam, Facilemindz, Dmaiolo, Contingentsecurity, Scopecreep, Artem12345, Wiki slav, Mr. Guye, Nic Cohen,
RheaceJones, Lugia2453, SFK2, Ofthehighest, Negus 69, MjadenSTEM, Patient Zero, KH-1, Maaxy, Sarac12345, Httpscard, Albozian,
KasparBot, Johngot, Johnhamel04, Lu. Rene, Jjacksonca, Happony, CS104-g8, Khalid Samiltoud, Manijeh Navidnia, A2zbrandon, Jcondes, Micheal345, Unisankar, Three07457, Jamil ur Rehman bazai, Jivi.vasid and Anonymous: 364
10.2
Images
File:Ambox_important.svg Source: https://upload.wikimedia.org/wikipedia/commons/b/b4/Ambox_important.svg License: Public domain Contributors: Own work, based o of Image:Ambox scales.svg Original artist: Dsmurat (talk contribs)
File:Berlin_Schnefeld_Airport_metal_detectors.jpg Source: https://upload.wikimedia.org/wikipedia/commons/f/f7/Berlin_Sch%
C3%B6nefeld_Airport_metal_detectors.jpg License: GFDL Contributors: Own work Original artist: Ralf Roletschek
File:Commons-logo.svg Source: https://upload.wikimedia.org/wikipedia/en/4/4a/Commons-logo.svg License: CC-BY-SA-3.0 Contributors: ? Original artist: ?
File:Delta_World_HQ_-_entrance_with_security_station.JPG Source:
https://upload.wikimedia.org/wikipedia/commons/9/94/
Delta_World_HQ_-_entrance_with_security_station.JPG License: CC BY-SA 3.0 Contributors: Own work Original artist: Mav
File:Edit-clear.svg Source: https://upload.wikimedia.org/wikipedia/en/f/f2/Edit-clear.svg License: Public domain Contributors: The
Tango! Desktop Project. Original artist:
The people from the Tango! project. And according to the meta-data in the le, specically: Andreas Nilsson, and Jakub Steiner (although
minimally).
File:Question_book-new.svg Source: https://upload.wikimedia.org/wikipedia/en/9/99/Question_book-new.svg License: Cc-by-sa-3.0
Contributors:
Created from scratch in Adobe Illustrator. Based on Image:Question book.png created by User:Equazcion Original artist:
Tkgd2007
File:Security_spikes_1.jpg Source: https://upload.wikimedia.org/wikipedia/commons/e/e4/Security_spikes_1.jpg License: Public domain Contributors: Own work Original artist: Edward
10.3
Content license