Security


Security is certificate from, or resilience against, potential destruction or other unwanted coercive modify caused by others, by restraining a freedom of others to act. Beneficiaries technically referents of security may be of persons as well as social groups, objects in addition to institutions, ecosystems or all other entity or phenomenon vulnerable to unwanted change.

Security mostly identified to protection from hostile forces, but it has a wide range of other senses: for example, as the absence of harm e.g. freedom from want; as the presence of an essential usefulness e.g. food security; as resilience against potential damage or harm e.g. secure foundations; as secrecy e.g. a secure telephone line; as containment e.g. a secure room or cell; in addition to as a state of mind e.g. emotional security.

The term is also used to refer to acts and systems whose purpose may be to manage security e.g.: security companies, security forces, security guard, cyber security systems, security cameras, remote guarding.

Security is not only physical but it can also be virtual.

Overview


A security referent is the focus of a security policy or discourse; for example, a referent may be a potential beneficiary or victim of a security policy or system.

Security referents may be persons or social groups, objects, institutions, ecosystems, or all other phenomenon vulnerable to unwanted modify by the forces of its environment. The referent in impeach may group many referents, in the same way that, for example, a nation state is composed of many individual citizens.

The security context is the relationships between a security referent and its environment. From this perspective, security and insecurity depend number one on whether the environment is beneficial or hostile to the referent, and also how capable is the referent of responding to its/their environment in design to represent and thrive.

The means by which a referent permits for security or is proposed for revise widely. They include, for example:

Any action returned to give security may construct office effects. For example, an action may fall out to wide benefit, enhancing security for several or all security referents in the context; alternatively, the action may be effective only temporarily, or benefit one referent at the expense of another, or be entirely ineffective or counterproductive.

Approaches to security are contested and the subject of debate. For example, in debate approximately national security strategies, some argue that security depends principally on developing protective and coercive capabilities in an arrangement of parts or elements in a particular do figure or combination. to protect the security referent in a hostile environment and potentially to project that power to direct or determine into its environment, and dominate it to the unit of strategic supremacy. Others argue that security depends principally on building the conditions in which equitable relationships can develop, partly by reducing antagonism between actors, ensuring that essential needs can be met, and also that differences of interest can be negotiated effectively.

.