Surveillance refers to the systematic monitoring of people, places,
or activities for the purpose of gathering information, managing risks,
ensuring safety, or maintaining control.
Types of Surveillance:
1. Physical Surveillance: Involves direct observation of individuals, locations, or
activities by human agents.
2. Electronic Surveillance: Involves the use of technology like cameras, sensors,
and other monitoring devices to gather information remotely.
3. Mass Surveillance: Large-scale monitoring of entire populations or
communities, often through electronic means, raising privacy concerns.
Purpose of Surveillance:
1. Security: To prevent and detect criminal activities, trespassing, and other
threats.
2. Public Safety: Monitoring public spaces to respond to emergencies or natural
disasters.
3. Traffic Control: Monitoring traffic flow and enforcing traffic laws.
4. Retail and Business: Preventing theft, shoplifting, and monitoring employee
behavior.
5. Data Collection: Gathering information for analysis and decision-making in
various fields.
Technologies Used:
1. CCTV Cameras: Closed-circuit television cameras for real-time monitoring.
2. Biometric Systems: Facial recognition, fingerprint scans, etc., for identity
verification.
3. Drones: Aerial surveillance for hard-to-reach areas.
4. Data Analytics: Processing and analysing large amounts of surveillance data
for insights.
Privacy Concerns:
1. Invasion of Privacy: Balancing security needs with individual privacy rights.
2. Data Misuse: Risk of collected data being used for unauthorized purposes.
3. Mass Surveillance: Potential abuse of power by governments or entities.
Security:
Definition:
Security involves measures taken to protect individuals, organizations,
assets, and information from various threats and risks.
Types of Security:
1. Physical Security: Measures to protect physical assets and spaces, including
barriers, locks, and guards.
2. Cybersecurity: Protecting digital systems, networks, and data from cyber
threats.
3. Information Security: Safeguarding sensitive and confidential information
from unauthorized access.
Layers of Security:
1. Preventive Measures: Steps taken to prevent breaches, such as access
controls, firewalls, and security policies.
2. Detective Measures: Monitoring systems for early detection of breaches or
incidents.
3. Corrective Measures: Actions taken to mitigate the impact of a security
breach.
4. Deterrent Measures: Discouraging potential threats through visible security
measures.
Security Threats:
1. Physical Threats: Burglary, vandalism, unauthorized access.
2. Cyber Threats: Malware, hacking, phishing, data breaches.
3. Social Engineering: Manipulating individuals to reveal confidential
information.
Risk Assessment:
1. Identifying potential risks and vulnerabilities.
2. Evaluating the potential impact and likelihood of risks.
3. Developing strategies to mitigate or manage identified risks.
Response and Recovery:
Incident Response: Having a plan in place to respond to security breaches.
Business Continuity: Ensuring operations continue despite security incidents.
Disaster Recovery: Steps to restore systems and data after a security incident.