أنت تبحث عن ملخص دور المواطن في المحافظة على الأمن ، سنشارك معك اليوم مقالة حول أمن – ويكيبيديا تم تجميعها وتحريرها بواسطة فريقنا من عدة مصادر على الإنترنت. آمل أن تكون هذه المقالة التي تتناول موضوع ملخص دور المواطن في المحافظة على الأمن مفيدة لك.
أمن – ويكيبيديا
Security It is freedom from, or resistance to, possible harm (or any undesirable forced change) from outside forces. Security beneficiaries may be persons, social groups, objects and institutions, ecosystems, and any other entity or phenomenon that may be subject to any change in any environment.
Security mostly refers to protection from hostile forces, but it has a wide range of other references: for example, as the absence of harm (such as freedom from want), as the presence of an essential good (such as food security), as resistance against potential harm or risk (such as secure institutions ), as confidential (eg, a secure phone line), as containment (eg, a secure room or cell) and as a state of mind (eg, emotional security).
The term is also used to refer to actions and systems whose purpose may be to provide security: (such as security forces, security guard, technological security systems, security cameras, and remote guarding).
Origin of the word[عدل]
The word “safe” entered the English language in the sixteenth century. The word is derived from the Latin “secures”, meaning freedom from anxiety: Se (without) + cura (anxiety).
A security reference is the focus of a security policy or letter. For example, a referrer may be a potential beneficiary or victim of a security policy or system. Security references may be people, social groups, objects, institutions, ecosystems, or any other phenomenon subject to unwanted change by the forces of their environment. The marja’ in turn may gather many marja’ in the same way that, for example, a nation-state is made up of many individual citizens.
The security context is the relationships between a security authority and its environment. Security and insecurity from this perspective depends first on whether the environment is beneficial or hostile to the reference, and also how well the reference is able to respond to its environment in order to survive and thrive.
The means by which reference is provided for security vary widely. include, for example:
- Coercive capabilities including the ability to project coercive force into the environment (eg aircraft carrier, gun).
- Security systems (such as lock, fence, anti-virus software, and air defense system).
- Warning systems (such as alarm and radar).
- Diplomatic and social action aimed at preventing insecurity from developing (eg conflict prevention and transformation strategies).
- A policy aimed at developing economic, physical, environmental and other security conditions (such as economic reform, environmental protection, and gradual disarmament).
Any measure intended to provide security may have multiple effects. For example, an action may have a significant benefit which enhances security for many or all security references in a context; Alternatively, the procedure may only be effective temporarily, benefit one authority at the expense of another, or be completely ineffective or counterproductive.
Roads to security are contentious and a matter of debate. For example, in the discussion of national security strategies some argue that security depends primarily on the development of preventive and coercive capabilities in order to protect the security reference in a hostile environment (and perhaps to project that force into and control its environment until strategic advantage). Others argue that security depends fundamentally on building the conditions in which equitable relationships can develop, in part by reducing hostility between actors, ensuring that basic needs are met, and that differences of interest can be negotiated effectively.
Examples of security contexts[عدل]
The table shows some of the key areas where security concerns arise.
world of information technology
The scope of security contexts is illustrated by the following examples:
Computer security, also known as IT security, refers to the security of processing devices such as computers and smartphones, and also refers to computer networks such as private and public networks and the Internet. The field is considered to be of increasing importance due to the increasing reliance on computer systems in most societies. It’s about protecting hardware, software, data, and people, as well as the procedures by which systems are accessed. Computer security means include the physical security of systems and the security of the information on them.
Corporate security refers to the resilience of companies against espionage, theft, damage and other threats. Corporate security has become more complex as reliance on IT systems has increased, and its physical presence has become more dispersed in many countries including environments that are, or could quickly become, hostile.
Environmental security refers to the integrity of ecosystems and the biosphere, particularly with regard to their ability to sustain a variety of life forms (including human life). The security of ecosystems has attracted greater attention due to the increasing impact of environmental damage by humans.
Food security refers to the ready supply of and access to safe and nutritious food. Food security is gaining importance at a time when the world’s population has grown and productive land has been diminished through overuse and climate change.
Home security usually refers to security systems used in residential properties (typically including doors, locks, alarm systems, lighting, and fencing); and personal security practices (such as ensuring doors are locked, alarms are set, and windows are closed).
Human security is the name of a paradigm that emerged in response to the traditional focus on the right of nation-states to protect themselves, and focused on the primacy of the security of people (individuals and societies). The United Nations General Assembly supports this concept as it stresses the “right of people to live in freedom and dignity” and recognizes that “all individuals, Especially the vulnerable, they have the right to be free from fear and be free from want.”
National security refers to the security of the state, including its people, economy, and institutions. In practice, state governments rely on a wide range of means including diplomacy, economic strength, and military capabilities.
Because it is not possible to know exactly how much security something has (and measures of vulnerabilities cannot be avoided), concepts of security differ greatly. For example, fear of dying from an earthquake is common in the USA, but slipping on the bathroom floor kills more people; And in France, the United Kingdom and the United States there are far fewer deaths from terrorism than women killed by their partners in the home.
Another problem of perception is the common assumption that just having a security system (such as armed forces or anti-virus software) means security is guaranteed. For example, two computer security programs installed on the same machine can prevent each other from working properly, while the user assumes that he or she is benefiting from the weak protection provided by only one program.
Security theater is a critical term for metrics that change perceptions of security without necessarily affecting security itself. For example, visual signs of security protection such as a home announcing its alarm system may deter an intruder whether or not the system is working properly. Likewise, an increased presence of military personnel on the streets of a city after a terrorist attack may help reassure the public whether or not it reduces the risk of further attacks.
Examples of security concepts[عدل]
Certain concepts recur in various areas of security:
- Access control: Selective restriction of access to another place or resource.
- Warranty: An expression of confidence that a security measure will perform as expected.
- Authorization: The function of defining rights or privileges to access resources related to information security and computer security in general and access control in particular.
- Countermeasure: A means of preventing an action or system from having its intended effect.
- Defense in Depth: A school of thought that asserts that a broader range of security measures will enhance security.
- Exploit: A way to take advantage of a vulnerability in a security system (usually a technology-related security system).
- Identity management: Enables the right people to access the right resources at the right times and for the right reasons.
- Resilience: The extent to which a person, society, nation, or system can resist adverse external forces.
- Risk: A possible event that may lead to damage or loss.
- Security management: identifying the organization’s assets (including people, buildings, machines, systems, and information assets), followed by developing documents and procedures and implementing policies and procedures to protect these assets.
- Threat: a potential source of harm.
- Vulnerability: The degree to which something can be changed (usually in an undesirable way) by external forces.
- ^ Online Etymology Dictionary. “Origin and meaning of secure”. www.etymonline.com (in English). Archived from the original on 2019-05-01. Retrieved 2017-12-17.
- ↑ a B T Gee، D (2016). “Rethinking Security: A discussion paper” (PDF). rethinkingsecurity.org.uk. Ammerdown Group. Archived from the original (PDF) On 2019-09-06. See it on date 2017-12-17.
- ^ FCNL (2015). “Peace Through Shared Security” (English). Archived from the original on 2019-10-1. Retrieved 2017-12-17.
- ^ Rogers، P (2010). Losing control : global security in the twenty-first century (ط. 3rd). London: Pluto Press. ISBN 9780745329376. OCLC 658007519. Archived from the original on December 9, 2019.
- ^ US, Department of Defense (2000). “Joint Vision 2020 Emphasizes Full-spectrum Dominance”. archive.defense.gov (in English). Archived from the original on 2019-11-15. Retrieved 2017-12-17.
- ^ House of Commons Defence Committee (2015). “Re-thinking defence to meet new threats”. publications.parliament.uk. Archived from the original on December 20, 2018. See it on date 2017-12-17.
- ^ General Sir Nicholas Houghton (2015). “Building a British military fit for future challenges rather than past conflicts”. www.gov.uk (in English). Archived from the original on 2019-07-23. Retrieved 2017-12-17.
- ^ United Nations General Assembly (2005). “Resolution adopted by the General Assembly 60/1: World Summit Outcome” (PDF). Archived from the original (PDF) On 2018-05-16. See it on date 2017-12-17.
- ^ United Nations (1945). “Charter of the United Nations, Chapter VII”. www.un.org (in English). Archived from the original on 2019-11-12. Retrieved 2017-12-17.
|security On sister projects:|
|Authority Control: National Libraries||
- Law portal
- Community portal
- Technology portal
- Human Rights Portal
فيديو حول ملخص دور المواطن في المحافظة على الأمن
دور المواطن في المحافظة على الأمن mp4
سؤال حول ملخص دور المواطن في المحافظة على الأمن
إذا كانت لديك أي أسئلة حول ملخص دور المواطن في المحافظة على الأمن ، فيرجى إخبارنا ، وستساعدنا جميع أسئلتك أو اقتراحاتك في تحسين المقالات التالية!
تم تجميع المقالة ملخص دور المواطن في المحافظة على الأمن من قبل أنا وفريقي من عدة مصادر. إذا وجدت المقالة ملخص دور المواطن في المحافظة على الأمن مفيدة لك ، فالرجاء دعم الفريق أعجبني أو شارك!
قيم المقالات أمن – ويكيبيديا
التقييم: strong> 4-5 نجوم
التقييمات: strong> 5 3 8 3
المشاهدات: strong> 3 8 3 4 5 0 3 9
بحث عن الكلمات الرئيسية ملخص دور المواطن في المحافظة على الأمن
طريقة ملخص دور المواطن في المحافظة على الأمن
برنامج تعليمي ملخص دور المواطن في المحافظة على الأمن
ملخص دور المواطن في المحافظة على الأمن مجاني