82:
750:
911:
45:
627:
810:
709:
664:
645:
784:
1717:
329:
Any action intended to provide security may have multiple effects. For example, an action may have a wide benefit, enhancing security for several or all security referents in the context; alternatively, the action may be effective only temporarily, benefit one referent at the expense of another, or
1028:
Since it is not possible to know with precision the extent to which something is 'secure' (and a measure of vulnerability is unavoidable), perceptions of security vary, often greatly. For example, a fear of death by earthquake is common in the United States (US), but slipping on the bathroom floor
224:
The security context is the relationships between a security referent and its environment. From this perspective, security and insecurity depend first on whether the environment is beneficial or hostile to the referent and also on how capable the referent is of responding to their environment in
215:
Security referents may be persons or social groups, objects, institutions, ecosystems, or any other phenomenon vulnerable to unwanted change by the forces of its environment. The referent in question may combine many referents in the same way that, for example, a nation-state is composed of many
623:, theft, damage, and other threats. The security of corporations has become more complex as reliance on IT systems has increased, and their physical presence has become more highly distributed across several countries, including environments that are, or may rapidly become, hostile to them.
346:). Others argue that security depends principally on building the conditions in which equitable relationships can develop, partly by reducing antagonism between actors, ensuring that fundamental needs can be met, and also ensuring that differences of interest can be negotiated effectively.
779:
Home security normally refers to the security systems used on a property used as a dwelling (commonly including doors, locks, alarm systems, lighting, fencing); and personal security practices (such as ensuring doors are locked, alarms are activated, windows are closed
593:. The field has growing importance due to the increasing reliance on computer systems in most societies. It concerns the protection of hardware, software, data, people, and also the procedures by which systems are accessed. The means of computer security include the
342:, some argue that security depends principally on developing protective and coercive capabilities in order to protect the security referent in a hostile environment (and potentially to project that power into its environment, and dominate it to the point of
1002:– identification of an organization's assets (including people, buildings, machines, systems and information assets), followed by the development, documentation, and implementation of policies and procedures for protecting these assets.
1054:
is a critical term for measures that change perceptions of security without necessarily affecting security itself. For example, visual signs of security protections, such as a home that advertises its alarm system, may deter an
127:
Security is both a feeling and a state of reality. One can feel secure, while they aren't, but also feel insecure while they are secure. This distinction is usually not very clear to express in the
English language.
825:
that, in response to traditional emphasis on the right of nation-states to protect themselves, has focused on the primacy of the security of people (individuals and communities). The concept is supported by the
2610:
860:
Information security refers to the security of information in any form. Spoken, written, digital, networked, technological, and procedural forms of information are all examples that may be covered in an
1372:
1048:
programs installed on the same device can prevent each other from working properly, while the user assumes that he or she benefits from twice the protection that only one program would afford.
1616:
1220:
948:– the function of specifying access rights/privileges to resources related to information security and computer security in general and to access control in particular.
2482:
81:
2446:
2218:
38:
1295:
78:) of security may be persons and social groups, objects and institutions, ecosystems, or any other entity or phenomenon vulnerable to unwanted change.
1913:
870:
1609:
212:
is the focus of a security policy or discourse; for example, a referent may be a potential beneficiary (or victim) of a security policy or system.
1749:
96:
Security mostly refers to protection from hostile forces, but it has a wide range of other senses: for example, as the absence of harm (e.g.,
749:
705:(including human life). The security of ecosystems has attracted greater attention as the impact of ecological damage by humans has grown.
1461:
1209:
742:
food. Food security is gaining in importance as the world's population has grown and productive land has diminished through overuse and
1576:
914:
2478:
1688:
1349:
910:
144:
2581:
2529:
918:
1664:
862:
827:
44:
2371:
2279:
895:, including its people, economy, and institutions. In practice, state governments rely on a wide range of means, including
2457:
2440:
2296:
2259:
626:
2253:
2245:
1998:
987:
969:
809:
105:
1543:
2497:
2202:
1906:
581:
Computer security, also known as cybersecurity or IT security, refers to the security of computing devices such as
172:
2502:
2315:
2309:
2046:
1270:
233:
The means by which a referent provides for security (or is provided for) vary widely. They include, for example:
160:
31:
1742:
2673:
2507:
2468:
2284:
2029:
1899:
2349:
2301:
2264:
1787:
1036:
Another problem of perception is the common assumption that the mere presence of a security system (such as
954:– an algorithm that defines a set of steps to encrypt or decrypt information so that it is incomprehensible.
455:
373:
343:
298:
intended to prevent insecurity from developing (e.g. conflict prevention and transformation strategies); and
2574:
978:– enables the right individuals to access the right resources at the right times and for the right reasons.
972:(noun) – a means of capitalizing on a vulnerability in a security system (usually a cyber-security system).
708:
2544:
2534:
1837:
716:
688:
634:
526:
445:
259:
1101:
2569:
2213:
1735:
469:
304:
intended to develop the lasting economic, physical, ecological, and other conditions of security (e.g.,
275:
1029:
kills more people; and in France, the United
Kingdom, and the US, there are far fewer deaths caused by
48:
990:– the degree to which a person, community, nation or system is able to resist adverse external forces.
2419:
2332:
2208:
1986:
1880:
1827:
1767:
1721:
1096:
855:
598:
398:
368:
1812:
2668:
2549:
2492:
2487:
2473:
2394:
2364:
2291:
2274:
1967:
1950:
1852:
1777:
999:
975:
1486:
1386:
1019:– the degree to which something may be changed (usually in an unwanted manner) by external forces.
2376:
2337:
2269:
2169:
2119:
2114:
1802:
1792:
1041:
939:
792:
610:
567:
The range of security contexts is illustrated by the following examples (in alphabetical order):
435:
271:
121:
2559:
1320:
2663:
2554:
2518:
2463:
2404:
2359:
2240:
2080:
2051:
1857:
1847:
1832:
1797:
1782:
1572:
1355:
1345:
1133:
1086:
1060:
1045:
886:
843:
839:
594:
576:
548:
536:
521:
516:
506:
460:
403:
393:
378:
339:
168:
156:
109:
97:
52:
338:
Approaches to security are contested and the subject of debate. For example, in debate about
183:
The word 'secure' entered the
English language in the 16th century. It is derived from Latin
131:
The term is also used to refer to acts and systems whose purpose may be to provide security (
2642:
2524:
2409:
2235:
2223:
2064:
1979:
1245:
1051:
966:– a school of thought holding that a wider range of security measures will enhance security.
963:
874:
656:
586:
430:
408:
388:
313:
241:
132:
1067:
may help to reassure the public, whether or not it diminishes the risk of further attacks.
984:– secret data, typically a string of characters, usually used to confirm a user's identity.
2630:
2539:
2434:
2399:
2386:
2320:
1922:
1867:
1862:
1822:
1807:
788:
631:
590:
553:
511:
413:
164:
148:
140:
136:
838:" and recognized "that all individuals, in particular vulnerable people, are entitled to
2342:
2193:
2142:
2109:
2098:
2070:
1991:
1944:
1121:
957:
933:
900:
804:
753:
743:
663:
652:
531:
484:
479:
317:
152:
1436:
1125:
693:
Environmental security, also known as ecological security, refers to the integrity of
2657:
2615:
2603:
2513:
2424:
2414:
2179:
2148:
2134:
2036:
2019:
1817:
1091:
1016:
1005:
945:
774:
761:
733:
668:
648:
489:
465:
450:
440:
383:
101:
89:
2085:
2024:
2008:
1974:
1842:
1411:
892:
702:
474:
1296:"Building a British military fit for future challenges rather than past conflicts"
644:
1640:
2625:
2564:
2174:
2129:
2124:
2104:
1962:
1772:
783:
757:
616:
354:
The table shows some of the main domains where security concerns are prominent.
117:
108:
against potential damage or harm (e.g. secure foundations); as secrecy (e.g., a
71:
17:
942:– an expression of confidence that a security measure will perform as expected.
240:, including the capacity to project coercive power into the environment (e.g.,
2620:
2090:
2075:
2015:
1056:
1359:
1137:
2598:
2429:
2354:
2325:
1064:
1030:
896:
814:
739:
698:
694:
676:
620:
305:
113:
63:
1536:
1716:
2452:
2056:
1665:"Don't Believe In The War On Women? Would A Body Count Change Your Mind?"
1161:
1037:
981:
960:– a means of preventing an act or system from having its intended effect.
904:
822:
712:
582:
249:
209:
75:
67:
2003:
1537:"Resolution adopted by the General Assembly 60/1: World Summit Outcome"
835:
831:
720:
672:
638:
309:
245:
85:
2164:
1081:
1010:
951:
738:
Food security refers to the ready supply of, and access to, safe and
279:
1511:
936:– the selective restriction of access to a place or other resource.
1891:
1076:
909:
808:
782:
748:
707:
662:
643:
625:
289:
263:
80:
43:
1342:
Losing control : global security in the twenty-first century
1727:
1387:"Resolution adopted by the General Assembly on 20 December 2010"
993:
929:
Certain concepts recur throughout different fields of security:
267:
1895:
1731:
1059:, whether or not the system functions properly. Similarly, the
37:"Security breach" redirects here. For the 2021 video game, see
1462:"Only 60 Years of Farming Left If Soil Degradation Continues"
1437:"Greater focus on soil health needed to feed a hungry planet"
996:– a possible event which could lead to damage, harm, or loss.
357:
1033:
than there are women killed by their partners in the home.
866:
1596:
Beyond Fear: Thinking about
Security in an Uncertain World
701:, particularly in relation to their capacity to sustain a
1569:
1126:"The Difference Between Feeling and Reality in Security"
655:
are used to control what is allowed to pass through an
88:
fleeing war and insecurity in Iraq and Syria arrive at
1246:"Joint Vision 2020 Emphasizes Full-spectrum Dominance"
830:, which has stressed "the right of people to live in
2591:
2385:
2192:
2157:
1936:
1929:
877:are thus all subdomains of information security.
27:Degree of resistance to, or protection from, harm
1689:"Violences conjugales: 118 femmes tuées en 2014"
1191:(Boulder: Lynne Rienner Publishers, 1998), p. 32
615:Corporate security refers to the resilience of
100:); as the presence of an essential good (e.g.,
1373:"Reliance spells end of road for ICT amateurs"
891:National security refers to the security of a
330:be entirely ineffective or counterproductive.
1907:
1743:
589:such as private and public networks, and the
8:
1487:"Charter of the United Nations, Chapter VII"
2447:Hazard analysis and critical control points
1269:House of Commons Defence Committee (2015).
1187:Barry Buzan, Ole Wæver, and Jaap de Wilde,
630:Security checkpoint at the entrance to the
62:is protection from, or resilience against,
55:with avoiding conversations about war work.
1933:
1914:
1900:
1892:
1750:
1736:
1728:
1435:Food and Agriculture Organization (2013).
1271:"Re-thinking defence to meet new threats"
1210:"Rethinking Security: A discussion paper"
667:Security checkpoint at the entrance to a
2420:Structured or semi-structured interviews
1535:United Nations General Assembly (2005).
1385:United Nations General Assembly (2010).
1061:increased presence of military personnel
39:Five Nights at Freddy's: Security Breach
1113:
92:, supported by Spanish volunteers, 2015
1416:United Nations Sustainable Development
1294:General Sir Nicholas Houghton (2015).
1189:Security: A New Framework for Analysis
1590:
1588:
1344:(3rd ed.). London: Pluto Press.
1044:) implies security. For example, two
813:Youth play among the bombed ruins of
7:
1203:
1201:
1199:
1197:
1183:
1181:
1155:
1153:
2550:Bayesian statistics and Bayes nets
1512:"UN Trust Fund for Human Security"
1244:US, Department of Defense (2000).
915:U.S. Customs and Border Protection
25:
2479:Failure mode and effects analysis
1063:on the streets of a city after a
787:Security spikes on the wall of a
120:); and as a state of mind (e.g.,
2582:Multi-criteria decision analysis
2530:Reliability centered maintenance
1715:
187:, meaning freedom from anxiety:
1622:from the original on 2022-10-09
1598:, Copernicus Books, pages 26–27
1549:from the original on 2022-10-09
1321:"Peace Through Shared Security"
1226:from the original on 2022-10-09
863:information security management
828:United Nations General Assembly
2498:Cause and consequence analysis
2372:Occupational safety and health
2280:Identity and access management
1375:, May 07, 2013, The Australian
1162:"Origin and meaning of secure"
1104:for cyber security investments
821:Human security is an emerging
1:
1160:Online Etymology Dictionary.
1013:– a potential source of harm.
225:order to survive and thrive.
2458:Structured What If Technique
2441:Hazard and operability study
2297:Business continuity planning
1610:"The Terrorism Acts in 2011"
925:Security concepts (examples)
585:and smartphones, as well as
350:Security contexts (examples)
340:national security strategies
314:progressive demilitarization
296:Diplomatic and social action
2435:Preliminary hazard analysis
2254:Operational risk management
919:Canada–United States border
865:scheme. Computer security,
112:); as containment (e.g., a
2690:
2519:Human reliability analysis
2203:Enterprise risk management
1608:David Anderson QC (2012).
1412:"Hunger and food security"
1275:publications.parliament.uk
884:
853:
802:
772:
731:
686:
608:
574:
36:
29:
2508:Layer protection analysis
2503:Cause-and-effect analysis
2310:Financial risk management
2047:Vulnerability (computing)
1876:
1763:
1217:rethinkingsecurity.org.uk
32:Security (disambiguation)
2469:Business impact analysis
2285:Vulnerability management
2231:Personal risk management
2030:Global catastrophic risk
66:harm (or other unwanted
2350:Precautionary principle
2302:Disaster risk reduction
1788:Control system security
1567:Newsome, Bruce (2013).
1485:United Nations (1945).
1024:Perceptions of security
703:diversity of life-forms
599:security of information
456:Infrastructure security
374:Communications security
51:(1941–1945) associated
2545:Monte Carlo simulation
2535:Sneak circuit analysis
1930:Risk type & source
1838:International security
921:
818:
795:
765:
724:
717:environmental security
689:Environmental security
683:Environmental security
679:
660:
641:
635:corporate headquarters
527:International security
446:Environmental security
157:cyber security systems
93:
56:
2570:Cost/benefit analysis
2214:Regulatory compliance
1571:. SAGE Publications.
1460:Arsenault, C (2014).
913:
905:military capabilities
812:
786:
752:
711:
666:
647:
629:
470:Supply chain security
238:Coercive capabilities
216:individual citizens.
110:secure telephone line
84:
47:
2333:Strategic management
2209:Corporate governance
1987:Anthropogenic hazard
1881:Security engineering
1828:Information security
1768:Application security
1724:at Wikimedia Commons
1097:Security convergence
856:Information security
850:Information security
756:is affecting global
399:Information security
369:Application security
334:Contested approaches
30:For other uses, see
2493:Event tree analysis
2488:Fault tree analysis
2474:Root cause analysis
2453:Toxicity assessment
2395:Exposure assessment
2365:Disaster management
2292:Incident management
2275:Security management
1968:Psychosocial hazard
1951:Reputational damage
1853:Operations security
1778:Collective security
1641:"What is femicide?"
1466:Scientific American
1250:archive.defense.gov
1219:. Ammerdown Group.
1000:Security management
976:Identity management
597:of systems and the
344:strategic supremacy
167:). Security can be
2575:Risk–benefit ratio
2377:Swiss cheese model
2338:Risk communication
2246:Disease management
2120:Exchange rate risk
2115:Interest rate risk
1803:Emotional security
1793:Corporate security
1340:Rogers, P (2010).
1042:antivirus software
922:
819:
796:
793:East End of London
766:
725:
680:
661:
642:
611:Corporate security
605:Corporate security
436:Corporate security
276:air defence system
272:antivirus software
256:Protective systems
122:emotional security
94:
57:
49:Women's Army Corps
2651:
2650:
2464:Scenario analysis
2405:Scenario planning
2360:Crisis management
2241:Stress management
2188:
2187:
2081:Reputational risk
1889:
1888:
1858:Physical security
1848:National security
1833:Internal security
1798:Economic security
1783:Computer security
1720:Media related to
1102:Gordon–Loeb model
1087:Security increase
1046:computer security
887:National security
881:National security
844:freedom from want
840:freedom from fear
595:physical security
587:computer networks
577:Computer security
571:Computer security
564:
563:
549:Economic security
537:Societal security
522:Internal security
517:Homeland security
507:National security
461:Physical security
404:Internet security
394:Endpoint security
379:Computer security
242:aircraft carriers
195:(care, anxiety).
98:freedom from want
53:national security
16:(Redirected from
2681:
2643:Opportunity cost
2592:Related concepts
2525:Bow tie analysis
2410:Contingency plan
2236:Health insurance
2224:Internal control
2065:Operational risk
1980:Natural disaster
1934:
1916:
1909:
1902:
1893:
1752:
1745:
1738:
1729:
1719:
1704:
1703:
1701:
1700:
1685:
1679:
1678:
1676:
1675:
1661:
1655:
1654:
1652:
1651:
1637:
1631:
1630:
1628:
1627:
1621:
1614:
1605:
1599:
1594:Bruce Schneier,
1592:
1583:
1582:
1564:
1558:
1557:
1555:
1554:
1548:
1541:
1532:
1526:
1525:
1523:
1522:
1510:United Nations.
1507:
1501:
1500:
1498:
1497:
1482:
1476:
1475:
1473:
1472:
1457:
1451:
1450:
1448:
1447:
1432:
1426:
1425:
1423:
1422:
1410:United Nations.
1407:
1401:
1400:
1398:
1397:
1382:
1376:
1370:
1364:
1363:
1337:
1331:
1330:
1328:
1327:
1316:
1310:
1309:
1307:
1306:
1291:
1285:
1284:
1282:
1281:
1266:
1260:
1259:
1257:
1256:
1241:
1235:
1234:
1232:
1231:
1225:
1214:
1205:
1192:
1185:
1176:
1175:
1173:
1172:
1157:
1148:
1147:
1145:
1144:
1118:
1065:terrorist attack
1052:Security theater
964:Defense in depth
875:network security
657:airport security
431:Airport security
409:Network security
389:Digital security
358:
161:security cameras
145:security service
133:security company
21:
18:Security systems
2689:
2688:
2684:
2683:
2682:
2680:
2679:
2678:
2674:Law enforcement
2654:
2653:
2652:
2647:
2631:Problem solving
2587:
2540:Markov analysis
2400:Hazard analysis
2387:Risk assessment
2381:
2316:Diversification
2194:Countermeasures
2184:
2153:
1999:Technology risk
1925:
1923:Risk management
1920:
1890:
1885:
1872:
1868:Social security
1863:Public security
1823:Health security
1808:Energy security
1759:
1756:
1712:
1707:
1698:
1696:
1687:
1686:
1682:
1673:
1671:
1663:
1662:
1658:
1649:
1647:
1639:
1638:
1634:
1625:
1623:
1619:
1612:
1607:
1606:
1602:
1593:
1586:
1579:
1566:
1565:
1561:
1552:
1550:
1546:
1539:
1534:
1533:
1529:
1520:
1518:
1509:
1508:
1504:
1495:
1493:
1484:
1483:
1479:
1470:
1468:
1459:
1458:
1454:
1445:
1443:
1434:
1433:
1429:
1420:
1418:
1409:
1408:
1404:
1395:
1393:
1384:
1383:
1379:
1371:
1367:
1352:
1339:
1338:
1334:
1325:
1323:
1318:
1317:
1313:
1304:
1302:
1293:
1292:
1288:
1279:
1277:
1268:
1267:
1263:
1254:
1252:
1243:
1242:
1238:
1229:
1227:
1223:
1212:
1208:Gee, D (2016).
1207:
1206:
1195:
1186:
1179:
1170:
1168:
1159:
1158:
1151:
1142:
1140:
1122:Schneier, Bruce
1120:
1119:
1115:
1111:
1073:
1026:
927:
917:vehicle at the
889:
883:
858:
852:
807:
801:
789:gated community
777:
771:
736:
730:
691:
685:
653:metal detectors
632:Delta Air Lines
613:
607:
579:
573:
565:
554:Social security
512:Public security
495:
485:Border security
419:
414:Usable security
352:
336:
327:
286:Warning systems
231:
222:
206:
201:
181:
165:remote guarding
149:security agency
141:security forces
137:security police
42:
35:
28:
23:
22:
15:
12:
11:
5:
2687:
2685:
2677:
2676:
2671:
2666:
2656:
2655:
2649:
2648:
2646:
2645:
2640:
2639:
2638:
2628:
2623:
2618:
2613:
2608:
2607:
2606:
2595:
2593:
2589:
2588:
2586:
2585:
2579:
2578:
2577:
2567:
2562:
2557:
2552:
2547:
2542:
2537:
2532:
2527:
2522:
2516:
2511:
2505:
2500:
2495:
2490:
2485:
2476:
2471:
2466:
2461:
2455:
2450:
2444:
2438:
2432:
2427:
2422:
2417:
2412:
2407:
2402:
2397:
2391:
2389:
2383:
2382:
2380:
2379:
2374:
2369:
2368:
2367:
2357:
2352:
2347:
2346:
2345:
2343:Warning system
2335:
2330:
2329:
2328:
2323:
2318:
2306:
2305:
2304:
2299:
2294:
2289:
2288:
2287:
2282:
2272:
2267:
2262:
2250:
2249:
2248:
2243:
2238:
2228:
2227:
2226:
2221:
2216:
2211:
2198:
2196:
2190:
2189:
2186:
2185:
2183:
2182:
2177:
2172:
2167:
2161:
2159:
2155:
2154:
2152:
2151:
2146:
2143:Strategic risk
2139:
2138:
2137:
2132:
2127:
2122:
2117:
2112:
2110:Liquidity risk
2107:
2099:Financial risk
2095:
2094:
2093:
2088:
2083:
2078:
2073:
2071:Execution risk
2061:
2060:
2059:
2054:
2049:
2039:
2034:
2033:
2032:
2027:
2013:
2012:
2011:
2006:
1996:
1995:
1994:
1992:Political risk
1984:
1983:
1982:
1972:
1971:
1970:
1965:
1955:
1954:
1953:
1945:Business risks
1940:
1938:
1931:
1927:
1926:
1921:
1919:
1918:
1911:
1904:
1896:
1887:
1886:
1884:
1883:
1877:
1874:
1873:
1871:
1870:
1865:
1860:
1855:
1850:
1845:
1840:
1835:
1830:
1825:
1820:
1815:
1813:Event security
1810:
1805:
1800:
1795:
1790:
1785:
1780:
1775:
1770:
1764:
1761:
1760:
1757:
1755:
1754:
1747:
1740:
1732:
1726:
1725:
1711:
1710:External links
1708:
1706:
1705:
1680:
1656:
1632:
1600:
1584:
1578:978-1483313405
1577:
1559:
1527:
1502:
1477:
1452:
1427:
1402:
1377:
1365:
1350:
1332:
1311:
1286:
1261:
1236:
1193:
1177:
1166:etymonline.com
1149:
1112:
1110:
1107:
1106:
1105:
1099:
1094:
1089:
1084:
1079:
1072:
1069:
1025:
1022:
1021:
1020:
1014:
1008:
1003:
997:
991:
985:
979:
973:
967:
961:
958:Countermeasure
955:
949:
943:
937:
934:Access control
926:
923:
901:economic power
885:Main article:
882:
879:
873:security, and
854:Main article:
851:
848:
805:Human security
803:Main article:
800:
799:Human security
797:
773:Main article:
770:
767:
754:Climate change
744:climate change
732:Main article:
729:
726:
687:Main article:
684:
681:
649:X-ray machines
609:Main article:
606:
603:
601:held on them.
575:Main article:
572:
569:
562:
561:
557:
556:
551:
540:
539:
534:
532:Human security
529:
524:
519:
514:
509:
497:
493:
492:
487:
482:
480:Security print
477:
472:
463:
458:
453:
448:
443:
438:
433:
421:
417:
416:
411:
406:
401:
396:
391:
386:
381:
376:
371:
356:
351:
348:
335:
332:
326:
323:
322:
321:
318:militarization
299:
293:
288:(e.g., alarm,
283:
253:
230:
227:
221:
218:
205:
202:
200:
197:
180:
177:
153:security guard
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
2686:
2675:
2672:
2670:
2667:
2665:
2662:
2661:
2659:
2644:
2641:
2637:
2634:
2633:
2632:
2629:
2627:
2624:
2622:
2619:
2617:
2616:Risk appetite
2614:
2612:
2609:
2605:
2604:ISO/IEC 31010
2602:
2601:
2600:
2597:
2596:
2594:
2590:
2583:
2580:
2576:
2573:
2572:
2571:
2568:
2566:
2563:
2561:
2558:
2556:
2553:
2551:
2548:
2546:
2543:
2541:
2538:
2536:
2533:
2531:
2528:
2526:
2523:
2520:
2517:
2515:
2514:Decision tree
2512:
2509:
2506:
2504:
2501:
2499:
2496:
2494:
2491:
2489:
2486:
2484:
2480:
2477:
2475:
2472:
2470:
2467:
2465:
2462:
2459:
2456:
2454:
2451:
2448:
2445:
2442:
2439:
2436:
2433:
2431:
2428:
2426:
2425:Delphi method
2423:
2421:
2418:
2416:
2415:Brainstorming
2413:
2411:
2408:
2406:
2403:
2401:
2398:
2396:
2393:
2392:
2390:
2388:
2384:
2378:
2375:
2373:
2370:
2366:
2363:
2362:
2361:
2358:
2356:
2353:
2351:
2348:
2344:
2341:
2340:
2339:
2336:
2334:
2331:
2327:
2324:
2322:
2319:
2317:
2314:
2313:
2312:
2311:
2307:
2303:
2300:
2298:
2295:
2293:
2290:
2286:
2283:
2281:
2278:
2277:
2276:
2273:
2271:
2268:
2266:
2263:
2261:
2258:
2257:
2256:
2255:
2251:
2247:
2244:
2242:
2239:
2237:
2234:
2233:
2232:
2229:
2225:
2222:
2220:
2217:
2215:
2212:
2210:
2207:
2206:
2205:
2204:
2200:
2199:
2197:
2195:
2191:
2181:
2180:Vulnerability
2178:
2176:
2173:
2171:
2168:
2166:
2163:
2162:
2160:
2156:
2150:
2149:Residual risk
2147:
2145:
2144:
2140:
2136:
2135:Systemic risk
2133:
2131:
2128:
2126:
2123:
2121:
2118:
2116:
2113:
2111:
2108:
2106:
2103:
2102:
2101:
2100:
2096:
2092:
2089:
2087:
2084:
2082:
2079:
2077:
2074:
2072:
2069:
2068:
2067:
2066:
2062:
2058:
2055:
2053:
2050:
2048:
2045:
2044:
2043:
2042:Security risk
2040:
2038:
2037:Safety hazard
2035:
2031:
2028:
2026:
2023:
2022:
2021:
2020:External risk
2017:
2014:
2010:
2007:
2005:
2002:
2001:
2000:
1997:
1993:
1990:
1989:
1988:
1985:
1981:
1978:
1977:
1976:
1973:
1969:
1966:
1964:
1961:
1960:
1959:
1958:Personal risk
1956:
1952:
1949:
1948:
1947:
1946:
1942:
1941:
1939:
1935:
1932:
1928:
1924:
1917:
1912:
1910:
1905:
1903:
1898:
1897:
1894:
1882:
1879:
1878:
1875:
1869:
1866:
1864:
1861:
1859:
1856:
1854:
1851:
1849:
1846:
1844:
1841:
1839:
1836:
1834:
1831:
1829:
1826:
1824:
1821:
1819:
1818:Food security
1816:
1814:
1811:
1809:
1806:
1804:
1801:
1799:
1796:
1794:
1791:
1789:
1786:
1784:
1781:
1779:
1776:
1774:
1771:
1769:
1766:
1765:
1762:
1758:Security Type
1753:
1748:
1746:
1741:
1739:
1734:
1733:
1730:
1723:
1718:
1714:
1713:
1709:
1694:
1693:Libération.fr
1690:
1684:
1681:
1670:
1666:
1660:
1657:
1646:
1642:
1636:
1633:
1618:
1611:
1604:
1601:
1597:
1591:
1589:
1585:
1580:
1574:
1570:
1563:
1560:
1545:
1538:
1531:
1528:
1517:
1513:
1506:
1503:
1492:
1488:
1481:
1478:
1467:
1463:
1456:
1453:
1442:
1438:
1431:
1428:
1417:
1413:
1406:
1403:
1392:
1388:
1381:
1378:
1374:
1369:
1366:
1361:
1357:
1353:
1351:9780745329376
1347:
1343:
1336:
1333:
1322:
1319:FCNL (2015).
1315:
1312:
1301:
1297:
1290:
1287:
1276:
1272:
1265:
1262:
1251:
1247:
1240:
1237:
1222:
1218:
1211:
1204:
1202:
1200:
1198:
1194:
1190:
1184:
1182:
1178:
1167:
1163:
1156:
1154:
1150:
1139:
1135:
1131:
1127:
1123:
1117:
1114:
1108:
1103:
1100:
1098:
1095:
1093:
1092:Security risk
1090:
1088:
1085:
1083:
1080:
1078:
1075:
1074:
1070:
1068:
1066:
1062:
1058:
1053:
1049:
1047:
1043:
1039:
1034:
1032:
1023:
1018:
1017:Vulnerability
1015:
1012:
1009:
1007:
1006:Security seal
1004:
1001:
998:
995:
992:
989:
986:
983:
980:
977:
974:
971:
968:
965:
962:
959:
956:
953:
950:
947:
946:Authorization
944:
941:
938:
935:
932:
931:
930:
924:
920:
916:
912:
908:
906:
902:
898:
894:
888:
880:
878:
876:
872:
868:
864:
857:
849:
847:
845:
841:
837:
833:
829:
824:
816:
811:
806:
798:
794:
790:
785:
781:
776:
775:Home security
769:Home security
768:
763:
762:food security
759:
755:
751:
747:
745:
741:
735:
734:Food security
728:Food security
727:
722:
718:
714:
710:
706:
704:
700:
696:
690:
682:
678:
674:
670:
669:shopping mall
665:
658:
654:
650:
646:
640:
636:
633:
628:
624:
622:
618:
612:
604:
602:
600:
596:
592:
588:
584:
578:
570:
568:
560:
555:
552:
550:
547:
546:
545:
544:
538:
535:
533:
530:
528:
525:
523:
520:
518:
515:
513:
510:
508:
505:
504:
503:
502:
498:
496:
491:
490:Security seal
488:
486:
483:
481:
478:
476:
473:
471:
467:
466:Port security
464:
462:
459:
457:
454:
452:
451:Home security
449:
447:
444:
442:
441:Food security
439:
437:
434:
432:
429:
428:
427:
426:
422:
420:
415:
412:
410:
407:
405:
402:
400:
397:
395:
392:
390:
387:
385:
384:Data security
382:
380:
377:
375:
372:
370:
367:
366:
365:
364:
363:Informational
360:
359:
355:
349:
347:
345:
341:
333:
331:
324:
319:
315:
311:
307:
303:
300:
297:
294:
291:
287:
284:
281:
277:
273:
269:
265:
261:
257:
254:
251:
247:
243:
239:
236:
235:
234:
228:
226:
219:
217:
213:
211:
203:
198:
196:
194:
190:
186:
178:
176:
174:
170:
166:
162:
158:
154:
150:
146:
142:
138:
134:
129:
125:
123:
119:
115:
111:
107:
103:
102:food security
99:
91:
90:Lesbos Island
87:
83:
79:
77:
74:(technically
73:
72:Beneficiaries
69:
65:
61:
54:
50:
46:
40:
33:
19:
2635:
2308:
2260:Supply chain
2252:
2230:
2201:
2141:
2097:
2086:Country risk
2063:
2041:
2025:Extreme risk
1975:Natural risk
1957:
1943:
1843:Job security
1697:. Retrieved
1692:
1683:
1672:. Retrieved
1668:
1659:
1648:. Retrieved
1644:
1635:
1624:. Retrieved
1603:
1595:
1568:
1562:
1551:. Retrieved
1530:
1519:. Retrieved
1515:
1505:
1494:. Retrieved
1490:
1480:
1469:. Retrieved
1465:
1455:
1444:. Retrieved
1440:
1430:
1419:. Retrieved
1415:
1405:
1394:. Retrieved
1390:
1380:
1368:
1341:
1335:
1324:. Retrieved
1314:
1303:. Retrieved
1299:
1289:
1278:. Retrieved
1274:
1264:
1253:. Retrieved
1249:
1239:
1228:. Retrieved
1216:
1188:
1169:. Retrieved
1165:
1141:. Retrieved
1129:
1116:
1050:
1038:armed forces
1035:
1027:
928:
893:nation-state
890:
859:
820:
778:
737:
692:
617:corporations
614:
580:
566:
558:
542:
541:
500:
499:
494:
475:Security bag
424:
423:
418:
362:
361:
353:
337:
328:
312:protection,
301:
295:
285:
255:
237:
232:
229:Capabilities
223:
214:
207:
192:
191:(without) +
188:
184:
182:
130:
126:
95:
59:
58:
2626:Rare events
2565:Risk Matrix
2175:Uncertainty
2158:Risk source
2130:Profit risk
2125:Market risk
2105:Credit risk
1963:Health risk
1773:Biosecurity
1695:(in French)
1645:Women's Aid
758:agriculture
208:A security
114:secure room
2669:Prevention
2658:Categories
2621:Hazard map
2560:Risk index
2091:Legal risk
2076:Model risk
2016:Macro risk
1699:2017-12-17
1674:2017-12-17
1650:2017-12-17
1626:2017-12-17
1553:2017-12-17
1521:2017-12-17
1496:2017-12-17
1471:2017-12-17
1446:2017-12-17
1421:2017-12-17
1396:2017-12-17
1326:2017-12-17
1305:2017-12-17
1280:2017-12-17
1255:2017-12-17
1230:2017-12-17
1171:2017-12-17
1143:2024-05-06
1109:References
988:Resilience
869:security,
740:nutritious
695:ecosystems
659:perimeter.
310:ecological
106:resilience
2599:ISO 31000
2481:(FMEA) /
2430:Checklist
2355:Insurance
2326:Risk pool
1937:Risk type
1360:658007519
1138:1059-1028
1031:terrorism
940:Assurance
897:diplomacy
815:Gaza City
699:biosphere
677:Indonesia
621:espionage
583:computers
501:Political
179:Etymology
76:referents
64:potential
2664:Security
2636:Security
2555:FN curve
2170:Conflict
2057:Accident
1722:Security
1669:Upworthy
1617:Archived
1544:Archived
1221:Archived
1071:See also
1057:intruder
982:Password
823:paradigm
713:Graffiti
697:and the
619:against
591:Internet
543:Monetary
425:Physical
308:reform,
306:economic
250:firearms
246:handguns
210:referent
204:Referent
199:Overview
169:physical
86:Refugees
68:coercion
60:Security
2460:(SWIFT)
2449:(HACCP)
2443:(HAZOP)
2270:Quality
2265:Project
2004:IT risk
1441:fao.org
970:Exploit
836:dignity
832:freedom
791:in the
721:Belarus
673:Jakarta
639:Atlanta
325:Effects
258:(e.g.,
220:Context
185:securus
173:virtual
2584:(MCDA)
2510:(LOPA)
2165:Hazard
2052:Threat
1575:
1516:un.org
1491:un.org
1391:un.org
1358:
1348:
1300:gov.uk
1136:
1082:Safety
1011:Threat
952:Cipher
903:, and
817:, 2009
723:, 2016
715:about
559:
302:Policy
280:armour
104:); as
2521:(HRA)
2483:FMECA
2437:(PHA)
2321:Hedge
1620:(PDF)
1613:(PDF)
1547:(PDF)
1540:(PDF)
1224:(PDF)
1213:(PDF)
1130:Wired
1077:Peace
780:etc.)
290:radar
264:fence
2611:COSO
1573:ISBN
1356:OCLC
1346:ISBN
1134:ISSN
994:Risk
842:and
834:and
760:and
651:and
268:wall
260:lock
193:cura
171:and
118:cell
2219:GRC
1040:or
871:ICT
846:".
671:in
637:in
124:).
116:or
70:).
2660::
2018:/
2009:AI
1691:.
1667:.
1643:.
1615:.
1587:^
1542:.
1514:.
1489:.
1464:.
1439:.
1414:.
1389:.
1354:.
1298:.
1273:.
1248:.
1215:.
1196:^
1180:^
1164:.
1152:^
1132:.
1128:.
1124:.
907:.
899:,
867:IT
746:.
719:,
675:,
320:).
316:,
278:,
274:,
270:,
266:,
262:,
252:);
248:,
244:,
189:se
175:.
163:,
159:,
155:,
151:,
147:,
143:,
139:,
135:,
1915:e
1908:t
1901:v
1751:e
1744:t
1737:v
1702:.
1677:.
1653:.
1629:.
1581:.
1556:.
1524:.
1499:.
1474:.
1449:.
1424:.
1399:.
1362:.
1329:.
1308:.
1283:.
1258:.
1233:.
1174:.
1146:.
764:.
468:/
292:)
282:)
41:.
34:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.