CHAPTER 1
INTRODUCTION TO SECURITY
This chapter provides as the elementary concepts of security and security management.
It presents the general overview of security. A definition of security management is also given to
make us understand the groundwork of the administrative processes or procedures in the
operational environment of security as applied in the Philippines setting.
A. Security in General
1. Definition of Security
Security, in a collective sense, is the same as protection and safety; the state of being safe
and the condition of being protected against physical, social, spiritual, financial, political,
emotional, occupational, psychological or other types or consequences of failure, damage,
error, accidents, harm or any other event which could be consider not desirable.
Security is also freedom from fear, harm, danger, loss, destruction or damages.
Basically, it is the action of man against man that led to many unsecured and unsafe
conditions, Reasons could be economic, revenge, or unjust plain greed and avarice. Whatever the
motives, the civilized man needs adequate protection.
2. Fields of Security
The following are the fields of security classified according to each sphere or subjects;
a) IT FIELDS
• Computing Security - is a branch of information security applied to both theoretical and
actual computer systems. Computer security is a branch of computer science that
addresses enforcement of “secure” behavior on the operation of computers. The
definition of “secure” varies by application, and is typically defined implicitly or
explicitly by a security policy that addresses confidentiality, integrity and availability of
electronic information that is processed by or stored on computer systems.
• Data Security -is the means of ensuring that data is kept safe from corruption and that
access to it is suitably controlled. Thus data security helps to ensure privacy. It also helps
in protecting personal data.
• Application Security – encompasses measures taken to prevent exceptions in the security
policy of an application or the underlying system through flaws in the design,
development, or deployment of the application.
https://www.scribd.com/document/389377144/Chapter-1-Introduction-to-Industrial-
Security