Register now or log in to join your professional community.
Security is the degree of resistance to, or protection from, harm. It applies to any vulnerable and valuable asset, such as a person, dwelling, community, nation, or organization.
Perception of security may be poorly mapped to measureable objective security. For example, the fear of earthquakes has been reported to be more common than the fear of slipping on the bathroom floor although the latter kills many more people than the former.Similarly, the perceived effectiveness of security measures is sometimes different from the actual security provided by those measures. The presence of security protections may even be taken for security itself. For example, two computer security programs could be interfering with each other and even cancelling each other's effect, while the owner believes s/he is getting double the protection.
Different scenarios also give rise to the context in which security is maintained:
· With respect to classified matter, the condition that prevents unauthorized persons from having access to official information that is safeguarded in the interests of national security.
· Measures taken by a military unit, an activity or installation to protect itself against all acts designed to, or which may, impair its effectiveness.
Security theater is a critical term for deployment of measures primarily aimed at raising subjective security in a population without a genuine or commensurate concern for the effects of that measure on—and possibly decreasing—objective security. For example, some consider the screening of airline passengers based on static databases to have been Security Theater and Computer Assisted Passenger Prescreening System to have created adecrease in objective security.
Perception of security can also increase objective security when it affects or deters malicious behavior, as with visual signs of security protections, such as video surveillance, alarm systems in a home, or an anti-theft system in a car such as a vehicle tracking system or warning sign.
Since some intruders will decide not to attempt to break into such areas or vehicles, there can actually be less damage to windows in addition to protection of valuable objects inside. Without such advertisement, a might, for example, approach a car, break the window, and then flee in response to an alarm being triggered. Either way, perhaps the car itself and the objects inside aren't stolen, but with perceived security even the windows of the car have a lower chance of being damaged, increasing the financial security of its owner(s).
However, the non-profit, security research group, ISECOM, has determined that such signs may actually increase the violence, daring, and desperation of an intruder. This claim shows that perceived security works mostly on the provider and is not security at all.
It is important, however, for signs advertising security not to give clues as to how to subvert that security, for example in the case where a home burglar might be more likely to break into a certain home if he or she is able to learn beforehand which company makes its security system.
Certain concepts recur throughout different fields of security:
· Assurance - assurance is the level of guarantee that a security system will behave as expected
· Countermeasure - a countermeasure is a way to stop a threat from triggering a risk event
· Defense in depth - never rely on one single security measure alone
· Exploit - a vulnerability that has been triggered by a threat - a risk of1.0 (100%)
· Risk - a risk is a possible event which could cause a loss
· Threat - a threat is a method of triggering a risk event that is dangerous
· Vulnerability - a weakness in a target that can potentially be exploited by a security threat
There is an immense literature on the analysis and categorization of security. Part of the reason for this is that, in most security systems, the "weakest link in the chain" is the most important. The situation is asymmetric since the 'defender' must cover all points of attack while the attacker need only identify a single weak point upon which to concentrate.
IT realm
Physical realm
· Port security/Supply chain security
Political
G4S relies on it's years of international experience, resource centers and training academies across the globe.
G4S Egypt provides training not only to its own employees but to clients as well.
Within the organization, G4S Guarding provides training at three levels:
Training capsules specially designed for corporate clients include the following:
Hello Ashraf,
you have to specify which of security training do you think?
This is very huge matter.
We have physical security, Close protection, Security of buildings, Security of Confidential buildings, IT security, National security etc.
With best regards,
Mike H.
- Why security management
- Issues of security
- How to assess security hezards/ threats
- Security measures
- Safety equipment
- First aid and Kits
- Fire preventing tools, techniques and eqipment
-Evaquation
SANS and offensive security are the best !
SANS...>SANS504/SANS560/SANS542/ SANS660/SANS408/SANS610
Offensive security..>OSCP...>OSCE