Knowledge (XXG)

Security

Source đź“ť

82: 750: 911: 45: 627: 810: 709: 664: 645: 784: 1717: 329:
Any action intended to provide security may have multiple effects. For example, an action may have a wide benefit, enhancing security for several or all security referents in the context; alternatively, the action may be effective only temporarily, benefit one referent at the expense of another, or
1028:
Since it is not possible to know with precision the extent to which something is 'secure' (and a measure of vulnerability is unavoidable), perceptions of security vary, often greatly. For example, a fear of death by earthquake is common in the United States (US), but slipping on the bathroom floor
224:
The security context is the relationships between a security referent and its environment. From this perspective, security and insecurity depend first on whether the environment is beneficial or hostile to the referent and also on how capable the referent is of responding to their environment in
215:
Security referents may be persons or social groups, objects, institutions, ecosystems, or any other phenomenon vulnerable to unwanted change by the forces of its environment. The referent in question may combine many referents in the same way that, for example, a nation-state is composed of many
623:, theft, damage, and other threats. The security of corporations has become more complex as reliance on IT systems has increased, and their physical presence has become more highly distributed across several countries, including environments that are, or may rapidly become, hostile to them. 346:). Others argue that security depends principally on building the conditions in which equitable relationships can develop, partly by reducing antagonism between actors, ensuring that fundamental needs can be met, and also ensuring that differences of interest can be negotiated effectively. 779:
Home security normally refers to the security systems used on a property used as a dwelling (commonly including doors, locks, alarm systems, lighting, fencing); and personal security practices (such as ensuring doors are locked, alarms are activated, windows are closed
593:. The field has growing importance due to the increasing reliance on computer systems in most societies. It concerns the protection of hardware, software, data, people, and also the procedures by which systems are accessed. The means of computer security include the 342:, some argue that security depends principally on developing protective and coercive capabilities in order to protect the security referent in a hostile environment (and potentially to project that power into its environment, and dominate it to the point of 1002:– identification of an organization's assets (including people, buildings, machines, systems and information assets), followed by the development, documentation, and implementation of policies and procedures for protecting these assets. 1054:
is a critical term for measures that change perceptions of security without necessarily affecting security itself. For example, visual signs of security protections, such as a home that advertises its alarm system, may deter an
127:
Security is both a feeling and a state of reality. One can feel secure, while they aren't, but also feel insecure while they are secure. This distinction is usually not very clear to express in the English language.
825:
that, in response to traditional emphasis on the right of nation-states to protect themselves, has focused on the primacy of the security of people (individuals and communities). The concept is supported by the
2610: 860:
Information security refers to the security of information in any form. Spoken, written, digital, networked, technological, and procedural forms of information are all examples that may be covered in an
1372: 1048:
programs installed on the same device can prevent each other from working properly, while the user assumes that he or she benefits from twice the protection that only one program would afford.
1616: 1220: 948:– the function of specifying access rights/privileges to resources related to information security and computer security in general and to access control in particular. 2482: 81: 2446: 2218: 38: 1295: 78:) of security may be persons and social groups, objects and institutions, ecosystems, or any other entity or phenomenon vulnerable to unwanted change. 1913: 870: 1609: 212:
is the focus of a security policy or discourse; for example, a referent may be a potential beneficiary (or victim) of a security policy or system.
1749: 96:
Security mostly refers to protection from hostile forces, but it has a wide range of other senses: for example, as the absence of harm (e.g.,
749: 705:(including human life). The security of ecosystems has attracted greater attention as the impact of ecological damage by humans has grown. 1461: 1209: 742:
food. Food security is gaining in importance as the world's population has grown and productive land has diminished through overuse and
1576: 914: 2478: 1688: 1349: 910: 144: 2581: 2529: 918: 1664: 862: 827: 44: 2371: 2279: 895:, including its people, economy, and institutions. In practice, state governments rely on a wide range of means, including 2457: 2440: 2296: 2259: 626: 2253: 2245: 1998: 987: 969: 809: 105: 1543: 2497: 2202: 1906: 581:
Computer security, also known as cybersecurity or IT security, refers to the security of computing devices such as
172: 2502: 2315: 2309: 2046: 1270: 233:
The means by which a referent provides for security (or is provided for) vary widely. They include, for example:
160: 31: 1742: 2673: 2507: 2468: 2284: 2029: 1899: 2349: 2301: 2264: 1787: 1036:
Another problem of perception is the common assumption that the mere presence of a security system (such as
954:– an algorithm that defines a set of steps to encrypt or decrypt information so that it is incomprehensible. 455: 373: 343: 298:
intended to prevent insecurity from developing (e.g. conflict prevention and transformation strategies); and
2574: 978:– enables the right individuals to access the right resources at the right times and for the right reasons. 972:(noun) – a means of capitalizing on a vulnerability in a security system (usually a cyber-security system). 708: 2544: 2534: 1837: 716: 688: 634: 526: 445: 259: 1101: 2569: 2213: 1735: 469: 304:
intended to develop the lasting economic, physical, ecological, and other conditions of security (e.g.,
275: 1029:
kills more people; and in France, the United Kingdom, and the US, there are far fewer deaths caused by
48: 990:– the degree to which a person, community, nation or system is able to resist adverse external forces. 2419: 2332: 2208: 1986: 1880: 1827: 1767: 1721: 1096: 855: 598: 398: 368: 1812: 2668: 2549: 2492: 2487: 2473: 2394: 2364: 2291: 2274: 1967: 1950: 1852: 1777: 999: 975: 1486: 1386: 1019:– the degree to which something may be changed (usually in an unwanted manner) by external forces. 2376: 2337: 2269: 2169: 2119: 2114: 1802: 1792: 1041: 939: 792: 610: 567:
The range of security contexts is illustrated by the following examples (in alphabetical order):
435: 271: 121: 2559: 1320: 2663: 2554: 2518: 2463: 2404: 2359: 2240: 2080: 2051: 1857: 1847: 1832: 1797: 1782: 1572: 1355: 1345: 1133: 1086: 1060: 1045: 886: 843: 839: 594: 576: 548: 536: 521: 516: 506: 460: 403: 393: 378: 339: 168: 156: 109: 97: 52: 338:
Approaches to security are contested and the subject of debate. For example, in debate about
183:
The word 'secure' entered the English language in the 16th century. It is derived from Latin
131:
The term is also used to refer to acts and systems whose purpose may be to provide security (
2642: 2524: 2409: 2235: 2223: 2064: 1979: 1245: 1051: 966:– a school of thought holding that a wider range of security measures will enhance security. 963: 874: 656: 586: 430: 408: 388: 313: 241: 132: 1067:
may help to reassure the public, whether or not it diminishes the risk of further attacks.
984:– secret data, typically a string of characters, usually used to confirm a user's identity. 2630: 2539: 2434: 2399: 2386: 2320: 1922: 1867: 1862: 1822: 1807: 788: 631: 590: 553: 511: 413: 164: 148: 140: 136: 838:" and recognized "that all individuals, in particular vulnerable people, are entitled to 2342: 2193: 2142: 2109: 2098: 2070: 1991: 1944: 1121: 957: 933: 900: 804: 753: 743: 663: 652: 531: 484: 479: 317: 152: 1436: 1125: 693:
Environmental security, also known as ecological security, refers to the integrity of
2657: 2615: 2603: 2513: 2424: 2414: 2179: 2148: 2134: 2036: 2019: 1817: 1091: 1016: 1005: 945: 774: 761: 733: 668: 648: 489: 465: 450: 440: 383: 101: 89: 2085: 2024: 2008: 1974: 1842: 1411: 892: 702: 474: 1296:"Building a British military fit for future challenges rather than past conflicts" 644: 1640: 2625: 2564: 2174: 2129: 2124: 2104: 1962: 1772: 783: 757: 616: 354:
The table shows some of the main domains where security concerns are prominent.
117: 108:
against potential damage or harm (e.g. secure foundations); as secrecy (e.g., a
71: 17: 942:– an expression of confidence that a security measure will perform as expected. 240:, including the capacity to project coercive power into the environment (e.g., 2620: 2090: 2075: 2015: 1056: 1359: 1137: 2598: 2429: 2354: 2325: 1064: 1030: 896: 814: 739: 698: 694: 676: 620: 305: 113: 63: 1536: 1716: 2452: 2056: 1665:"Don't Believe In The War On Women? Would A Body Count Change Your Mind?" 1161: 1037: 981: 960:– a means of preventing an act or system from having its intended effect. 904: 822: 712: 582: 249: 209: 75: 67: 2003: 1537:"Resolution adopted by the General Assembly 60/1: World Summit Outcome" 835: 831: 720: 672: 638: 309: 245: 85: 2164: 1081: 1010: 951: 738:
Food security refers to the ready supply of, and access to, safe and
279: 1511: 936:– the selective restriction of access to a place or other resource. 1891: 1076: 909: 808: 782: 748: 707: 662: 643: 625: 289: 263: 80: 43: 1342:
Losing control : global security in the twenty-first century
1727: 1387:"Resolution adopted by the General Assembly on 20 December 2010" 993: 929:
Certain concepts recur throughout different fields of security:
267: 1895: 1731: 1059:, whether or not the system functions properly. Similarly, the 37:"Security breach" redirects here. For the 2021 video game, see 1462:"Only 60 Years of Farming Left If Soil Degradation Continues" 1437:"Greater focus on soil health needed to feed a hungry planet" 996:– a possible event which could lead to damage, harm, or loss. 357: 1033:
than there are women killed by their partners in the home.
866: 1596:
Beyond Fear: Thinking about Security in an Uncertain World
701:, particularly in relation to their capacity to sustain a 1569:
A Practical Introduction to Security and Risk Management
1126:"The Difference Between Feeling and Reality in Security" 655:
are used to control what is allowed to pass through an
88:
fleeing war and insecurity in Iraq and Syria arrive at
1246:"Joint Vision 2020 Emphasizes Full-spectrum Dominance" 830:, which has stressed "the right of people to live in 2591: 2385: 2192: 2157: 1936: 1929: 877:are thus all subdomains of information security. 27:Degree of resistance to, or protection from, harm 1689:"Violences conjugales: 118 femmes tuĂ©es en 2014" 1191:(Boulder: Lynne Rienner Publishers, 1998), p. 32 615:Corporate security refers to the resilience of 100:); as the presence of an essential good (e.g., 1373:"Reliance spells end of road for ICT amateurs" 891:National security refers to the security of a 330:be entirely ineffective or counterproductive. 1907: 1743: 589:such as private and public networks, and the 8: 1487:"Charter of the United Nations, Chapter VII" 2447:Hazard analysis and critical control points 1269:House of Commons Defence Committee (2015). 1187:Barry Buzan, Ole Wæver, and Jaap de Wilde, 630:Security checkpoint at the entrance to the 62:is protection from, or resilience against, 55:with avoiding conversations about war work. 1933: 1914: 1900: 1892: 1750: 1736: 1728: 1435:Food and Agriculture Organization (2013). 1271:"Re-thinking defence to meet new threats" 1210:"Rethinking Security: A discussion paper" 667:Security checkpoint at the entrance to a 2420:Structured or semi-structured interviews 1535:United Nations General Assembly (2005). 1385:United Nations General Assembly (2010). 1061:increased presence of military personnel 39:Five Nights at Freddy's: Security Breach 1113: 92:, supported by Spanish volunteers, 2015 1416:United Nations Sustainable Development 1294:General Sir Nicholas Houghton (2015). 1189:Security: A New Framework for Analysis 1590: 1588: 1344:(3rd ed.). London: Pluto Press. 1044:) implies security. For example, two 813:Youth play among the bombed ruins of 7: 1203: 1201: 1199: 1197: 1183: 1181: 1155: 1153: 2550:Bayesian statistics and Bayes nets 1512:"UN Trust Fund for Human Security" 1244:US, Department of Defense (2000). 915:U.S. Customs and Border Protection 25: 2479:Failure mode and effects analysis 1063:on the streets of a city after a 787:Security spikes on the wall of a 120:); and as a state of mind (e.g., 2582:Multi-criteria decision analysis 2530:Reliability centered maintenance 1715: 187:, meaning freedom from anxiety: 1622:from the original on 2022-10-09 1598:, Copernicus Books, pages 26–27 1549:from the original on 2022-10-09 1321:"Peace Through Shared Security" 1226:from the original on 2022-10-09 863:information security management 828:United Nations General Assembly 2498:Cause and consequence analysis 2372:Occupational safety and health 2280:Identity and access management 1375:, May 07, 2013, The Australian 1162:"Origin and meaning of secure" 1104:for cyber security investments 821:Human security is an emerging 1: 1160:Online Etymology Dictionary. 1013:– a potential source of harm. 225:order to survive and thrive. 2458:Structured What If Technique 2441:Hazard and operability study 2297:Business continuity planning 1610:"The Terrorism Acts in 2011" 925:Security concepts (examples) 585:and smartphones, as well as 350:Security contexts (examples) 340:national security strategies 314:progressive demilitarization 296:Diplomatic and social action 2435:Preliminary hazard analysis 2254:Operational risk management 919:Canada–United States border 865:scheme. Computer security, 112:); as containment (e.g., a 2690: 2519:Human reliability analysis 2203:Enterprise risk management 1608:David Anderson QC (2012). 1412:"Hunger and food security" 1275:publications.parliament.uk 884: 853: 802: 772: 731: 686: 608: 574: 36: 29: 2508:Layer protection analysis 2503:Cause-and-effect analysis 2310:Financial risk management 2047:Vulnerability (computing) 1876: 1763: 1217:rethinkingsecurity.org.uk 32:Security (disambiguation) 2469:Business impact analysis 2285:Vulnerability management 2231:Personal risk management 2030:Global catastrophic risk 66:harm (or other unwanted 2350:Precautionary principle 2302:Disaster risk reduction 1788:Control system security 1567:Newsome, Bruce (2013). 1485:United Nations (1945). 1024:Perceptions of security 703:diversity of life-forms 599:security of information 456:Infrastructure security 374:Communications security 51:(1941–1945) associated 2545:Monte Carlo simulation 2535:Sneak circuit analysis 1930:Risk type & source 1838:International security 921: 818: 795: 765: 724: 717:environmental security 689:Environmental security 683:Environmental security 679: 660: 641: 635:corporate headquarters 527:International security 446:Environmental security 157:cyber security systems 93: 56: 2570:Cost/benefit analysis 2214:Regulatory compliance 1571:. SAGE Publications. 1460:Arsenault, C (2014). 913: 905:military capabilities 812: 786: 752: 711: 666: 647: 629: 470:Supply chain security 238:Coercive capabilities 216:individual citizens. 110:secure telephone line 84: 47: 2333:Strategic management 2209:Corporate governance 1987:Anthropogenic hazard 1881:Security engineering 1828:Information security 1768:Application security 1724:at Wikimedia Commons 1097:Security convergence 856:Information security 850:Information security 756:is affecting global 399:Information security 369:Application security 334:Contested approaches 30:For other uses, see 2493:Event tree analysis 2488:Fault tree analysis 2474:Root cause analysis 2453:Toxicity assessment 2395:Exposure assessment 2365:Disaster management 2292:Incident management 2275:Security management 1968:Psychosocial hazard 1951:Reputational damage 1853:Operations security 1778:Collective security 1641:"What is femicide?" 1466:Scientific American 1250:archive.defense.gov 1219:. Ammerdown Group. 1000:Security management 976:Identity management 597:of systems and the 344:strategic supremacy 167:). Security can be 2575:Risk–benefit ratio 2377:Swiss cheese model 2338:Risk communication 2246:Disease management 2120:Exchange rate risk 2115:Interest rate risk 1803:Emotional security 1793:Corporate security 1340:Rogers, P (2010). 1042:antivirus software 922: 819: 796: 793:East End of London 766: 725: 680: 661: 642: 611:Corporate security 605:Corporate security 436:Corporate security 276:air defence system 272:antivirus software 256:Protective systems 122:emotional security 94: 57: 49:Women's Army Corps 2651: 2650: 2464:Scenario analysis 2405:Scenario planning 2360:Crisis management 2241:Stress management 2188: 2187: 2081:Reputational risk 1889: 1888: 1858:Physical security 1848:National security 1833:Internal security 1798:Economic security 1783:Computer security 1720:Media related to 1102:Gordon–Loeb model 1087:Security increase 1046:computer security 887:National security 881:National security 844:freedom from want 840:freedom from fear 595:physical security 587:computer networks 577:Computer security 571:Computer security 564: 563: 549:Economic security 537:Societal security 522:Internal security 517:Homeland security 507:National security 461:Physical security 404:Internet security 394:Endpoint security 379:Computer security 242:aircraft carriers 195:(care, anxiety). 98:freedom from want 53:national security 16:(Redirected from 2681: 2643:Opportunity cost 2592:Related concepts 2525:Bow tie analysis 2410:Contingency plan 2236:Health insurance 2224:Internal control 2065:Operational risk 1980:Natural disaster 1934: 1916: 1909: 1902: 1893: 1752: 1745: 1738: 1729: 1719: 1704: 1703: 1701: 1700: 1685: 1679: 1678: 1676: 1675: 1661: 1655: 1654: 1652: 1651: 1637: 1631: 1630: 1628: 1627: 1621: 1614: 1605: 1599: 1594:Bruce Schneier, 1592: 1583: 1582: 1564: 1558: 1557: 1555: 1554: 1548: 1541: 1532: 1526: 1525: 1523: 1522: 1510:United Nations. 1507: 1501: 1500: 1498: 1497: 1482: 1476: 1475: 1473: 1472: 1457: 1451: 1450: 1448: 1447: 1432: 1426: 1425: 1423: 1422: 1410:United Nations. 1407: 1401: 1400: 1398: 1397: 1382: 1376: 1370: 1364: 1363: 1337: 1331: 1330: 1328: 1327: 1316: 1310: 1309: 1307: 1306: 1291: 1285: 1284: 1282: 1281: 1266: 1260: 1259: 1257: 1256: 1241: 1235: 1234: 1232: 1231: 1225: 1214: 1205: 1192: 1185: 1176: 1175: 1173: 1172: 1157: 1148: 1147: 1145: 1144: 1118: 1065:terrorist attack 1052:Security theater 964:Defense in depth 875:network security 657:airport security 431:Airport security 409:Network security 389:Digital security 358: 161:security cameras 145:security service 133:security company 21: 18:Security systems 2689: 2688: 2684: 2683: 2682: 2680: 2679: 2678: 2674:Law enforcement 2654: 2653: 2652: 2647: 2631:Problem solving 2587: 2540:Markov analysis 2400:Hazard analysis 2387:Risk assessment 2381: 2316:Diversification 2194:Countermeasures 2184: 2153: 1999:Technology risk 1925: 1923:Risk management 1920: 1890: 1885: 1872: 1868:Social security 1863:Public security 1823:Health security 1808:Energy security 1759: 1756: 1712: 1707: 1698: 1696: 1687: 1686: 1682: 1673: 1671: 1663: 1662: 1658: 1649: 1647: 1639: 1638: 1634: 1625: 1623: 1619: 1612: 1607: 1606: 1602: 1593: 1586: 1579: 1566: 1565: 1561: 1552: 1550: 1546: 1539: 1534: 1533: 1529: 1520: 1518: 1509: 1508: 1504: 1495: 1493: 1484: 1483: 1479: 1470: 1468: 1459: 1458: 1454: 1445: 1443: 1434: 1433: 1429: 1420: 1418: 1409: 1408: 1404: 1395: 1393: 1384: 1383: 1379: 1371: 1367: 1352: 1339: 1338: 1334: 1325: 1323: 1318: 1317: 1313: 1304: 1302: 1293: 1292: 1288: 1279: 1277: 1268: 1267: 1263: 1254: 1252: 1243: 1242: 1238: 1229: 1227: 1223: 1212: 1208:Gee, D (2016). 1207: 1206: 1195: 1186: 1179: 1170: 1168: 1159: 1158: 1151: 1142: 1140: 1122:Schneier, Bruce 1120: 1119: 1115: 1111: 1073: 1026: 927: 917:vehicle at the 889: 883: 858: 852: 807: 801: 789:gated community 777: 771: 736: 730: 691: 685: 653:metal detectors 632:Delta Air Lines 613: 607: 579: 573: 565: 554:Social security 512:Public security 495: 485:Border security 419: 414:Usable security 352: 336: 327: 286:Warning systems 231: 222: 206: 201: 181: 165:remote guarding 149:security agency 141:security forces 137:security police 42: 35: 28: 23: 22: 15: 12: 11: 5: 2687: 2685: 2677: 2676: 2671: 2666: 2656: 2655: 2649: 2648: 2646: 2645: 2640: 2639: 2638: 2628: 2623: 2618: 2613: 2608: 2607: 2606: 2595: 2593: 2589: 2588: 2586: 2585: 2579: 2578: 2577: 2567: 2562: 2557: 2552: 2547: 2542: 2537: 2532: 2527: 2522: 2516: 2511: 2505: 2500: 2495: 2490: 2485: 2476: 2471: 2466: 2461: 2455: 2450: 2444: 2438: 2432: 2427: 2422: 2417: 2412: 2407: 2402: 2397: 2391: 2389: 2383: 2382: 2380: 2379: 2374: 2369: 2368: 2367: 2357: 2352: 2347: 2346: 2345: 2343:Warning system 2335: 2330: 2329: 2328: 2323: 2318: 2306: 2305: 2304: 2299: 2294: 2289: 2288: 2287: 2282: 2272: 2267: 2262: 2250: 2249: 2248: 2243: 2238: 2228: 2227: 2226: 2221: 2216: 2211: 2198: 2196: 2190: 2189: 2186: 2185: 2183: 2182: 2177: 2172: 2167: 2161: 2159: 2155: 2154: 2152: 2151: 2146: 2143:Strategic risk 2139: 2138: 2137: 2132: 2127: 2122: 2117: 2112: 2110:Liquidity risk 2107: 2099:Financial risk 2095: 2094: 2093: 2088: 2083: 2078: 2073: 2071:Execution risk 2061: 2060: 2059: 2054: 2049: 2039: 2034: 2033: 2032: 2027: 2013: 2012: 2011: 2006: 1996: 1995: 1994: 1992:Political risk 1984: 1983: 1982: 1972: 1971: 1970: 1965: 1955: 1954: 1953: 1945:Business risks 1940: 1938: 1931: 1927: 1926: 1921: 1919: 1918: 1911: 1904: 1896: 1887: 1886: 1884: 1883: 1877: 1874: 1873: 1871: 1870: 1865: 1860: 1855: 1850: 1845: 1840: 1835: 1830: 1825: 1820: 1815: 1813:Event security 1810: 1805: 1800: 1795: 1790: 1785: 1780: 1775: 1770: 1764: 1761: 1760: 1757: 1755: 1754: 1747: 1740: 1732: 1726: 1725: 1711: 1710:External links 1708: 1706: 1705: 1680: 1656: 1632: 1600: 1584: 1578:978-1483313405 1577: 1559: 1527: 1502: 1477: 1452: 1427: 1402: 1377: 1365: 1350: 1332: 1311: 1286: 1261: 1236: 1193: 1177: 1166:etymonline.com 1149: 1112: 1110: 1107: 1106: 1105: 1099: 1094: 1089: 1084: 1079: 1072: 1069: 1025: 1022: 1021: 1020: 1014: 1008: 1003: 997: 991: 985: 979: 973: 967: 961: 958:Countermeasure 955: 949: 943: 937: 934:Access control 926: 923: 901:economic power 885:Main article: 882: 879: 873:security, and 854:Main article: 851: 848: 805:Human security 803:Main article: 800: 799:Human security 797: 773:Main article: 770: 767: 754:Climate change 744:climate change 732:Main article: 729: 726: 687:Main article: 684: 681: 649:X-ray machines 609:Main article: 606: 603: 601:held on them. 575:Main article: 572: 569: 562: 561: 557: 556: 551: 540: 539: 534: 532:Human security 529: 524: 519: 514: 509: 497: 493: 492: 487: 482: 480:Security print 477: 472: 463: 458: 453: 448: 443: 438: 433: 421: 417: 416: 411: 406: 401: 396: 391: 386: 381: 376: 371: 356: 351: 348: 335: 332: 326: 323: 322: 321: 318:militarization 299: 293: 288:(e.g., alarm, 283: 253: 230: 227: 221: 218: 205: 202: 200: 197: 180: 177: 153:security guard 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 2686: 2675: 2672: 2670: 2667: 2665: 2662: 2661: 2659: 2644: 2641: 2637: 2634: 2633: 2632: 2629: 2627: 2624: 2622: 2619: 2617: 2616:Risk appetite 2614: 2612: 2609: 2605: 2604:ISO/IEC 31010 2602: 2601: 2600: 2597: 2596: 2594: 2590: 2583: 2580: 2576: 2573: 2572: 2571: 2568: 2566: 2563: 2561: 2558: 2556: 2553: 2551: 2548: 2546: 2543: 2541: 2538: 2536: 2533: 2531: 2528: 2526: 2523: 2520: 2517: 2515: 2514:Decision tree 2512: 2509: 2506: 2504: 2501: 2499: 2496: 2494: 2491: 2489: 2486: 2484: 2480: 2477: 2475: 2472: 2470: 2467: 2465: 2462: 2459: 2456: 2454: 2451: 2448: 2445: 2442: 2439: 2436: 2433: 2431: 2428: 2426: 2425:Delphi method 2423: 2421: 2418: 2416: 2415:Brainstorming 2413: 2411: 2408: 2406: 2403: 2401: 2398: 2396: 2393: 2392: 2390: 2388: 2384: 2378: 2375: 2373: 2370: 2366: 2363: 2362: 2361: 2358: 2356: 2353: 2351: 2348: 2344: 2341: 2340: 2339: 2336: 2334: 2331: 2327: 2324: 2322: 2319: 2317: 2314: 2313: 2312: 2311: 2307: 2303: 2300: 2298: 2295: 2293: 2290: 2286: 2283: 2281: 2278: 2277: 2276: 2273: 2271: 2268: 2266: 2263: 2261: 2258: 2257: 2256: 2255: 2251: 2247: 2244: 2242: 2239: 2237: 2234: 2233: 2232: 2229: 2225: 2222: 2220: 2217: 2215: 2212: 2210: 2207: 2206: 2205: 2204: 2200: 2199: 2197: 2195: 2191: 2181: 2180:Vulnerability 2178: 2176: 2173: 2171: 2168: 2166: 2163: 2162: 2160: 2156: 2150: 2149:Residual risk 2147: 2145: 2144: 2140: 2136: 2135:Systemic risk 2133: 2131: 2128: 2126: 2123: 2121: 2118: 2116: 2113: 2111: 2108: 2106: 2103: 2102: 2101: 2100: 2096: 2092: 2089: 2087: 2084: 2082: 2079: 2077: 2074: 2072: 2069: 2068: 2067: 2066: 2062: 2058: 2055: 2053: 2050: 2048: 2045: 2044: 2043: 2042:Security risk 2040: 2038: 2037:Safety hazard 2035: 2031: 2028: 2026: 2023: 2022: 2021: 2020:External risk 2017: 2014: 2010: 2007: 2005: 2002: 2001: 2000: 1997: 1993: 1990: 1989: 1988: 1985: 1981: 1978: 1977: 1976: 1973: 1969: 1966: 1964: 1961: 1960: 1959: 1958:Personal risk 1956: 1952: 1949: 1948: 1947: 1946: 1942: 1941: 1939: 1935: 1932: 1928: 1924: 1917: 1912: 1910: 1905: 1903: 1898: 1897: 1894: 1882: 1879: 1878: 1875: 1869: 1866: 1864: 1861: 1859: 1856: 1854: 1851: 1849: 1846: 1844: 1841: 1839: 1836: 1834: 1831: 1829: 1826: 1824: 1821: 1819: 1818:Food security 1816: 1814: 1811: 1809: 1806: 1804: 1801: 1799: 1796: 1794: 1791: 1789: 1786: 1784: 1781: 1779: 1776: 1774: 1771: 1769: 1766: 1765: 1762: 1758:Security Type 1753: 1748: 1746: 1741: 1739: 1734: 1733: 1730: 1723: 1718: 1714: 1713: 1709: 1694: 1693:LibĂ©ration.fr 1690: 1684: 1681: 1670: 1666: 1660: 1657: 1646: 1642: 1636: 1633: 1618: 1611: 1604: 1601: 1597: 1591: 1589: 1585: 1580: 1574: 1570: 1563: 1560: 1545: 1538: 1531: 1528: 1517: 1513: 1506: 1503: 1492: 1488: 1481: 1478: 1467: 1463: 1456: 1453: 1442: 1438: 1431: 1428: 1417: 1413: 1406: 1403: 1392: 1388: 1381: 1378: 1374: 1369: 1366: 1361: 1357: 1353: 1351:9780745329376 1347: 1343: 1336: 1333: 1322: 1319:FCNL (2015). 1315: 1312: 1301: 1297: 1290: 1287: 1276: 1272: 1265: 1262: 1251: 1247: 1240: 1237: 1222: 1218: 1211: 1204: 1202: 1200: 1198: 1194: 1190: 1184: 1182: 1178: 1167: 1163: 1156: 1154: 1150: 1139: 1135: 1131: 1127: 1123: 1117: 1114: 1108: 1103: 1100: 1098: 1095: 1093: 1092:Security risk 1090: 1088: 1085: 1083: 1080: 1078: 1075: 1074: 1070: 1068: 1066: 1062: 1058: 1053: 1049: 1047: 1043: 1039: 1034: 1032: 1023: 1018: 1017:Vulnerability 1015: 1012: 1009: 1007: 1006:Security seal 1004: 1001: 998: 995: 992: 989: 986: 983: 980: 977: 974: 971: 968: 965: 962: 959: 956: 953: 950: 947: 946:Authorization 944: 941: 938: 935: 932: 931: 930: 924: 920: 916: 912: 908: 906: 902: 898: 894: 888: 880: 878: 876: 872: 868: 864: 857: 849: 847: 845: 841: 837: 833: 829: 824: 816: 811: 806: 798: 794: 790: 785: 781: 776: 775:Home security 769:Home security 768: 763: 762:food security 759: 755: 751: 747: 745: 741: 735: 734:Food security 728:Food security 727: 722: 718: 714: 710: 706: 704: 700: 696: 690: 682: 678: 674: 670: 669:shopping mall 665: 658: 654: 650: 646: 640: 636: 633: 628: 624: 622: 618: 612: 604: 602: 600: 596: 592: 588: 584: 578: 570: 568: 560: 555: 552: 550: 547: 546: 545: 544: 538: 535: 533: 530: 528: 525: 523: 520: 518: 515: 513: 510: 508: 505: 504: 503: 502: 498: 496: 491: 490:Security seal 488: 486: 483: 481: 478: 476: 473: 471: 467: 466:Port security 464: 462: 459: 457: 454: 452: 451:Home security 449: 447: 444: 442: 441:Food security 439: 437: 434: 432: 429: 428: 427: 426: 422: 420: 415: 412: 410: 407: 405: 402: 400: 397: 395: 392: 390: 387: 385: 384:Data security 382: 380: 377: 375: 372: 370: 367: 366: 365: 364: 363:Informational 360: 359: 355: 349: 347: 345: 341: 333: 331: 324: 319: 315: 311: 307: 303: 300: 297: 294: 291: 287: 284: 281: 277: 273: 269: 265: 261: 257: 254: 251: 247: 243: 239: 236: 235: 234: 228: 226: 219: 217: 213: 211: 203: 198: 196: 194: 190: 186: 178: 176: 174: 170: 166: 162: 158: 154: 150: 146: 142: 138: 134: 129: 125: 123: 119: 115: 111: 107: 103: 102:food security 99: 91: 90:Lesbos Island 87: 83: 79: 77: 74:(technically 73: 72:Beneficiaries 69: 65: 61: 54: 50: 46: 40: 33: 19: 2635: 2308: 2260:Supply chain 2252: 2230: 2201: 2141: 2097: 2086:Country risk 2063: 2041: 2025:Extreme risk 1975:Natural risk 1957: 1943: 1843:Job security 1697:. Retrieved 1692: 1683: 1672:. Retrieved 1668: 1659: 1648:. Retrieved 1644: 1635: 1624:. Retrieved 1603: 1595: 1568: 1562: 1551:. Retrieved 1530: 1519:. Retrieved 1515: 1505: 1494:. Retrieved 1490: 1480: 1469:. Retrieved 1465: 1455: 1444:. Retrieved 1440: 1430: 1419:. Retrieved 1415: 1405: 1394:. Retrieved 1390: 1380: 1368: 1341: 1335: 1324:. Retrieved 1314: 1303:. Retrieved 1299: 1289: 1278:. Retrieved 1274: 1264: 1253:. Retrieved 1249: 1239: 1228:. Retrieved 1216: 1188: 1169:. Retrieved 1165: 1141:. Retrieved 1129: 1116: 1050: 1038:armed forces 1035: 1027: 928: 893:nation-state 890: 859: 820: 778: 737: 692: 617:corporations 614: 580: 566: 558: 542: 541: 500: 499: 494: 475:Security bag 424: 423: 418: 362: 361: 353: 337: 328: 312:protection, 301: 295: 285: 255: 237: 232: 229:Capabilities 223: 214: 207: 192: 191:(without) + 188: 184: 182: 130: 126: 95: 59: 58: 2626:Rare events 2565:Risk Matrix 2175:Uncertainty 2158:Risk source 2130:Profit risk 2125:Market risk 2105:Credit risk 1963:Health risk 1773:Biosecurity 1695:(in French) 1645:Women's Aid 758:agriculture 208:A security 114:secure room 2669:Prevention 2658:Categories 2621:Hazard map 2560:Risk index 2091:Legal risk 2076:Model risk 2016:Macro risk 1699:2017-12-17 1674:2017-12-17 1650:2017-12-17 1626:2017-12-17 1553:2017-12-17 1521:2017-12-17 1496:2017-12-17 1471:2017-12-17 1446:2017-12-17 1421:2017-12-17 1396:2017-12-17 1326:2017-12-17 1305:2017-12-17 1280:2017-12-17 1255:2017-12-17 1230:2017-12-17 1171:2017-12-17 1143:2024-05-06 1109:References 988:Resilience 869:security, 740:nutritious 695:ecosystems 659:perimeter. 310:ecological 106:resilience 2599:ISO 31000 2481:(FMEA) / 2430:Checklist 2355:Insurance 2326:Risk pool 1937:Risk type 1360:658007519 1138:1059-1028 1031:terrorism 940:Assurance 897:diplomacy 815:Gaza City 699:biosphere 677:Indonesia 621:espionage 583:computers 501:Political 179:Etymology 76:referents 64:potential 2664:Security 2636:Security 2555:FN curve 2170:Conflict 2057:Accident 1722:Security 1669:Upworthy 1617:Archived 1544:Archived 1221:Archived 1071:See also 1057:intruder 982:Password 823:paradigm 713:Graffiti 697:and the 619:against 591:Internet 543:Monetary 425:Physical 308:reform, 306:economic 250:firearms 246:handguns 210:referent 204:Referent 199:Overview 169:physical 86:Refugees 68:coercion 60:Security 2460:(SWIFT) 2449:(HACCP) 2443:(HAZOP) 2270:Quality 2265:Project 2004:IT risk 1441:fao.org 970:Exploit 836:dignity 832:freedom 791:in the 721:Belarus 673:Jakarta 639:Atlanta 325:Effects 258:(e.g., 220:Context 185:securus 173:virtual 2584:(MCDA) 2510:(LOPA) 2165:Hazard 2052:Threat 1575:  1516:un.org 1491:un.org 1391:un.org 1358:  1348:  1300:gov.uk 1136:  1082:Safety 1011:Threat 952:Cipher 903:, and 817:, 2009 723:, 2016 715:about 559: 302:Policy 280:armour 104:); as 2521:(HRA) 2483:FMECA 2437:(PHA) 2321:Hedge 1620:(PDF) 1613:(PDF) 1547:(PDF) 1540:(PDF) 1224:(PDF) 1213:(PDF) 1130:Wired 1077:Peace 780:etc.) 290:radar 264:fence 2611:COSO 1573:ISBN 1356:OCLC 1346:ISBN 1134:ISSN 994:Risk 842:and 834:and 760:and 651:and 268:wall 260:lock 193:cura 171:and 118:cell 2219:GRC 1040:or 871:ICT 846:". 671:in 637:in 124:). 116:or 70:). 2660:: 2018:/ 2009:AI 1691:. 1667:. 1643:. 1615:. 1587:^ 1542:. 1514:. 1489:. 1464:. 1439:. 1414:. 1389:. 1354:. 1298:. 1273:. 1248:. 1215:. 1196:^ 1180:^ 1164:. 1152:^ 1132:. 1128:. 1124:. 907:. 899:, 867:IT 746:. 719:, 675:, 320:). 316:, 278:, 274:, 270:, 266:, 262:, 252:); 248:, 244:, 189:se 175:. 163:, 159:, 155:, 151:, 147:, 143:, 139:, 135:, 1915:e 1908:t 1901:v 1751:e 1744:t 1737:v 1702:. 1677:. 1653:. 1629:. 1581:. 1556:. 1524:. 1499:. 1474:. 1449:. 1424:. 1399:. 1362:. 1329:. 1308:. 1283:. 1258:. 1233:. 1174:. 1146:. 764:. 468:/ 292:) 282:) 41:. 34:. 20:)

Index

Security systems
Security (disambiguation)
Five Nights at Freddy's: Security Breach

Women's Army Corps
national security
potential
coercion
Beneficiaries
referents

Refugees
Lesbos Island
freedom from want
food security
resilience
secure telephone line
secure room
cell
emotional security
security company
security police
security forces
security service
security agency
security guard
cyber security systems
security cameras
remote guarding
physical

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑