Enterprise Security: Frameworks, Models, and Methodologies
Problems of different natures require different premises, goals, and analytical methods.

Enterprise Security: Frameworks, Models, and Methodologies

The study of security is often hampered by a lack of rigorous theoretical foundations, leading to confusion between the concepts of "safety" and "security."

Security is not a static state but a dynamic equilibrium of opposing wills—a condition of "antagonism" rather than simple conflict.

This article synthesises a formal framework for operational security, defined as a function of the interaction between an Asset (A), a Protector (P), and a Threat (T) within a specific Situation (Si).

Article content
Threats, internal and external, exist at all levels

Key takeaways include:

  • The Problem of Definition: Security is frequently confused with its means (e.g., deterrence, technology) rather than its ends. In reality, it exists in a "grey area" of indeterminacy between perfect security and perfect non-security.
  • The Essential Model: A security context only exists when three interlinked components—Protector, Asset, and Threat—interact. The absence of any one component nullifies the security context.
  • Human Factor Dominance: Security is a product of human rationality, intention, and action. It is inherently subjective and egoistic, driven by the protector's self-interest and perception of risk.
  • Methodological Rigour: Effective security requires a transition from "automatic" prescriptions (checklists) to a four-stage analytical cycle: Context Analysis, System Analysis, Future Analysis, and Mitigation Strategy Definition.
  • Epistemic Goal: The objective of security analysis is to reach a "justified true belief" that a problem has been adequately addressed, acknowledging that such beliefs are transient as threats and technologies evolve.

The Conceptual Problem of Security

The primary hurdle in addressing security is determining if a problem is indeed one of "security." Problems of different natures require different premises, goals, and analytical methods.

Security vs. Safety

There is a long-standing cultural dispute between the physical sciences (often focusing on "safety") and the social sciences (focusing on "security").

  • Safety: Often deals with hazards and risks originating from accidents or chance.
  • Security: Deals with "intentional" events driven by an antagonist with a rationale.
  • The Royal Society (1983/1992): Recognised the difficulty in agreeing on common definitions for terms like risk, hazard, and threat across different sub-groups.

Article content

The "Grey Area" of Indeterminacy

In theory, one might imagine "perfect security" (total freedom from danger) or "perfect non-security." In nature, neither exists.

  • Ideal States: In perfect security, there is no need for protection; in perfect non-security, there is no utility in trying to achieve it.
  • Real-Life Security: Real life exists in a "grey area" where security and non-security coexist.
  • Operational Goal: Operational security aims to transform and maintain the largest possible area of insecurity into a state of "practical security" (P-S).

Article content

The Formal Definition of Security

Operational security is expressed as a systemic function:

S = f(A, P, T) Si

Article content

Functional Dynamics

  • Interdependence: A protector cannot exist without an asset; a threat has no meaning without a target asset.
  • Role Fluidity: Functional roles may overlap. An asset can be its own protector (e.g., personal security) or even its own threat (e.g., suicide).

The Role of Situation (Si): Situation is not an actor but a characterising factor.

Even a minimal change in situational variables (time, psychological factors, and administrative laws) can represent the difference between protection and loss.
Article content

The Illusion of Safety: 5 Counter-Intuitive Truths About Modern Security

Most organisations approach security as a hardware acquisition phase—more cameras, thicker glass, or additional guards. We often rush into these expensive solutions without asking the essential question posed by Giovanni Manunta: "What kind of problem are we really in?" We must stop viewing security as a static destination and recognise it as a dynamic equilibrium of opposing human forces.

Security is Not Safety (And the Confusion is Costly)

We are currently suffering from a collective delusion that security can be managed through the same statistical models used for safety.

Safety generally addresses the "accidental product of chance," which can be mitigated through the physical sciences and predictable math.

Security is entirely different; it is a "product of antagonism" driven by thoughtful, motivated, and reactive human wills.

Because an antagonist is a "living risk" that learns from your conduct and adapts to your defences, traditional statistics and determinism are fundamentally useless. An antagonist is driven by choice and rationale, making them a creative force that traditional probability cannot account for. If your analysis relies on math rather than intelligence and strategy, you are preparing for a hazard, not a threat.

"Security, as risk, means ‘different things to different people and different things in different contexts’ (The Royal Society, 1992: 7)."

Article content

The Paradox of Implementation—When More Security Makes You Less Secure

The mere implementation of technology and procedures does not guarantee a higher state of security; in fact, it often generates "malign effects." Poorly defined measures can attract unwanted attention, infringe on civil rights, or even suggest internal treachery to observers. Without a functional definition of what security is actually for, these measures become a "rich pageantry of life" that serves no operational purpose.

When we lack a clear theoretical framework, we become unsure of the actual causes of what we are achieving. We spend millions on visible deterrents while remaining blind to whether those measures are meeting their goals or simply increasing the level of conflict. True security lies in the reasoning behind the action, not in the volume of equipment installed.

Article content

The Functional Identity Crisis—You are the Asset and the Protector

In the "A, P, T" model—Asset, Protector, and Threat—roles are functional rather than physically distinct. A single entity can inhabit multiple roles simultaneously, shifting depending entirely on the observer's perspective and the level of analysis. In personal security, for example, the individual is both the thing being protected and the entity responsible for the protection.

This fluidity is best seen in the example of the "military genius." A brilliant general is a vital Asset to the army and a Protector of the nation’s interests. However, from the state's perspective, that same general becomes a Threat if their genius and operational capabilities exceed political control.

Understanding security requires identifying the "originator of the process" to determine who is playing which role at any given moment.
Article content
Article content

Security is an "Infinite Game" of Obsolescence

Security is a forced and costly response to someone else’s initiative, making it an "infinite game" where every success is destined for obsolescence. As shown in the cycle of gap closure and continual monitoring, the moment a gap is closed, a reactive antagonist begins searching for a new vulnerability. There is a constant, shifting tension between your "Posture"—what you intend to do—and your "Actual" state of protection.

Interestingly, this infinite game is one of preservation rather than destruction. Unlike the military or finance sectors, where risk-taking is rewarded, security practitioners are fundamentally risk-averse. Because the goal is to preserve an existing state, flight is always preferred to fight. Avoidance and deterrence are the hallmarks of a successful strategy, separating security from more aggressive, risk-prone fields.

Article content


The Myth of the Objective Assessment

There is bitter evidence in this industry: a truly objective security assessment is an impossibility. Every analyst brings a heritage of training, unconscious beliefs, and self-interest that colour their vision and expectations. When an analyst presents "facts," they are actually presenting a perspective influenced by their own mental set and personal vision.

"Complexity of the concept defies easy reductionism, which makes things difficult for those who confound numbers with knowledge."

Because security data is dynamic and partially unknown, we cannot rely on the rigid facts of physics. Instead, we must strive for "justified true beliefs" that are robust enough to withstand the scrutiny of a funding board or a court of justice.

The reasoning behind every decision must be transparent and easy to inspect, as the argument's logic is the only thing that remains valid when the data shifts.
Article content
Article content

Conclusion: Beyond the Fences and Alarms

We must move away from the "shopping list" approach of guards and CCTV and toward a systemic, theoretical framework. Security is a daily struggle for life, a rational response to the basic human instinct for survival and tranquillity.

It is an open system that simultaneously interferes with the individual, the organisation, and the state.

If security is a dynamic equilibrium of opposing wills rather than a collection of barriers, are you focusing your resources on the right antagonists? Or are you merely participating in the expensive pageantry of protection while your vulnerabilities evolve in the shadows?

The Logic of Antagonism and Intentionality

Security is a "product of antagonism"—a conflict between at least two human wills where one seeks protection and the other causes worry.

The Three Stages of Security Action

A security process is fully intentional and follows three stages:

  1. Perception: Identifying evidence of a possible threat (e.g., a noise, a shadow).
  2. Cognition: The realisation that the evidence represents a genuine threat.
  3. Decision: The choice to act upon this cognition.

Security as Risk-Aversion

Unlike "risk-prone" fields (financial or military), security is inherently risk-averse.

  • Flight over Fight: Practitioners prefer avoidance and deterrence. Accepting significant risk is a last resort.
  • Self-Interest: Security is "egoistic." Owners safeguard their own assets, often using measures that encourage an antagonist to move elsewhere (displacement).

Justification: Security measures are not "defend to the last" but "defend as long as justified" based on self-utility.

Analytical Methodology

Effective security moves away from "automatic" prescriptions (fences, CCTV) toward a systemic methodology.

The Four Stages of Analysis

  1. Context Analysis (The Backbone): Identifying the Asset, Protector, Threat, and Situation. Skipping the assessment of assets and protectors leads to poor threat definitions.
  2. System Analysis: Interrelating findings to identify Vulnerability, Opportunity, Capability, and Intention. An asset is not at risk if the threat has no opportunity, even if a vulnerability exists.
  3. Future Analysis: Formulation of scenarios and "evolutionary dynamics." This identifies risks and uncertainties through Event Tree Analysis and Risk Assessment.
  4. Mitigation Strategy Definition: Defining operational requirements for People, Intelligence, Structures, Systems, Procedures, and Controls.

The "Infinite Game" of Monitoring

As illustrated in contemporary systems thinking, security is a cycle of Continual Monitoring.

  • Postures: Knowledge and Information influence the "Actual Security Posture" vs. the "Desired Security Posture."

Gap Management: The difference between actual and desired states is the "Gap," which must be closed through managed influence and threat mitigation.

Epistemic Challenges and Constraints

Security analysis is never fully objective; it is a human-made process subject to significant biases.

The Role of the Analyst

  • Subjectivity: A consultant’s mental set, beliefs, and self-interest unconsciously influence the analysis.
  • The Need for Vetting: Security and intelligence specialists may be prone to "disinformation and concealment," necessitating rigorous vetting and source validation.
  • Transparency: Because assessments are subjective, all steps of reasoning must be "clear and easy to inspect."

Justified True Belief

Because the security context is dynamic—threats, technologies, and tactics change—a "permanent" solution is impossible. The goal is to reach a "justified true belief" that the problem is currently addressed. This belief must be:

  • Robust enough for funding approval.
  • Defensible in a court of justice.
  • Flexible enough to adapt to rapid obsolescence caused by imaginative antagonists who learn from their errors.

Practical Implementation

To be effective, security must be situated in its particular circumstances.

  • Detailed Situational Analysis: At the operational level, situational factors must be as detailed as possible.
  • Systemic Reasoning: At the general level, a systemic approach (looking at the total effect of variables) is more appropriate than an analytic one (looking at single variables).

Decision Criteria: Final decisions on performance standards are usually "political," involving negotiations and compromises between different stakeholders within an organisation. The credibility and charisma of the security-responsible are often decisive in these negotiations.

Article content

Conclusion

The epistemic requirement for professional security is the attainment of a "Justified True Belief." Because security contexts are unstable and decisions are influenced by human bias (beliefs, expectations, self-interest), every step of the reasoning must be clear and easy to inspect. This rigour is not optional; it is the only basis for attributing responsibility, blame, and liability in judicial or corporate contexts. While the game is infinite and the conditions are dynamic, the methodology provides the only justifiable foundation for action.

Article content

Tony Ridley, MSc CSyP FSyI SRMCP

Risk, Safety, Security, Resilience & Management Sciences

Risk Management Security Management Crisis Management

Risk, Security, Safety, Resilience & Management Sciences

References:

Manaunta, G. & Manunta R. (2026). Theorising About Security, in Gill. M. (ed), The Handbook of Security, 1st ed, Palgrave Macmillan, pp.629-657

Ridley, T. (2025). Security Risk Management-in-Depth, Available at: https://buff.ly/vBSVPgv

Willet, K. (2022). Systems Thinking in Security, in Masys, A. (ed). Handbook of Security Sciences, Springer, pp.553-572.

To view or add a comment, sign in

More articles by Tony Ridley, MSc CSyP FSyI SRMCP

Others also viewed

Explore content categories