YOU MIGHT ALSO LIKE
ASSOCIATED TAGS
attackers  breach  detection  deterrence  function  functions  million  organizations  physical  prevention  recovery  response  security  systems  threats  
LATEST POSTS

What Are the Five Functions of Security? A Real-World Breakdown

We’ve all seen the headlines—hacks, leaks, breaches. But behind each one, there’s a breakdown in one (or more) of these functions. The thing is, most organizations don’t fail because they lack tools. They fail because they misunderstand how these five parts interact. Like a Swiss watch with one bent gear, everything looks fine—until it isn’t.

Defining Security: Beyond Surveillance and Firewalls

Let’s start at the beginning. Security isn’t a thing. It’s a process. It’s not just about stopping bad things—it’s about managing risk in a world where perfect safety doesn’t exist. People don’t think about this enough: even the best systems fail. What separates the resilient from the wrecked is how they’re built to bend, not break.

Security operates across physical, digital, and human domains. A bank vault is useless if the guard can be bribed. An encrypted server fails if someone clicks a phishing link. That’s why the five functions must be treated as a system—not a checklist.

What We Mean by "Function"

Function here means purpose—what a security measure is supposed to achieve. It’s not about the tool, but the result. A camera doesn’t “do” security. It supports a function. Detection, for example. Or deterrence. Understanding this difference is where most beginners stumble. They buy tech without asking: “What function does this serve?” Spoiler: if it doesn’t fit one of the five, it’s probably decoration.

Why Five? Why Not More or Less?

Some frameworks list seven functions. Others collapse them into three. The five-function model sticks because it’s broad enough to cover everything, yet specific enough to guide action. Remove one, and the whole structure wobbles. Combine two, and you blindspot risk. That said, experts disagree on the exact definitions—especially around deterrence. Is it psychological? Tactical? A bit of both? Honestly, it’s unclear.

Prevention: The First Line of Defense (But Not the Last)

Prevention stops threats before they happen. It’s the locked door, the firewall, the background check. We’re told this is where security starts—and in theory, it is. In practice? Prevention is overrated. I’m convinced that no system, no matter how tight, can block everything. Because humans adapt. So do attackers. So do circumstances.

And that’s exactly where the myth of “perfect prevention” collapses. Take the 2013 Target breach—$18.5 million in settlements, 41 million customer records exposed. Their prevention tools were state-of-the-art. But attackers came in through a HVAC vendor’s compromised credentials. One weak link. That changes everything. Prevention failed not because it was weak, but because it was trusted too much.

Access control, encryption, physical barriers, user training—all are prevention tools. But they only work if you assume the attacker plays fair. They don’t. They look for the back door, the forgotten account, the unpatched server from 2017. That’s why prevention needs company. It can’t work alone.

Here’s the irony: the more you rely on prevention, the more brittle your security becomes. Because when (not if) it fails, you’ve got nothing behind it. And that’s a terrifying place to be.

How Prevention Fails in the Real World

You’d be surprised how often basic prevention fails not from sophistication, but sloppiness. In 2020, a major U.S. hospital system was hacked—because an employee used “password123” on an admin account. No AI, no zero-day exploit. Just plain negligence. Prevention isn’t just about tools. It’s about culture. Without it, even the best tech is a paper shield.

Why Over-Investing in Prevention Backfires

Budgets get skewed. Companies spend 80% on firewalls and biometrics, then ignore response planning. When the breach hits, panic sets in. Recovery takes weeks. Reputational damage lingers for years. That’s the problem: prevention gives a false sense of control. It feels like safety. But it’s more like a seatbelt in a car with no brakes.

Detection: Seeing the Invisible Before It’s Too Late

Detection answers one question: “Is something wrong?” It’s motion sensors, intrusion alerts, log monitoring, behavioral analytics. Unlike prevention, detection doesn’t stop threats. It shouts when they arrive. And in a world where breaches take an average of 287 days to identify (IBM, 2023), that shout might come too late. But it’s still better than silence.

Here’s where it gets tricky: detecting false positives is as hard as catching real threats. Deploy too many sensors, and your team drowns in alerts. Miss one real signal in 10,000 noise spikes, and you’re compromised. The issue remains: detection systems need tuning, expertise, and time—resources most organizations underfund.

Take the 2017 Equifax breach. Hackers exploited a known vulnerability. Detection tools spotted the traffic. But alerts were ignored. Why? Because the SOC team was overwhelmed. They’d normalized the noise. So the breach ran for 76 days. Think about that: over two months of invisible data exfiltration. All because detection worked—but no one listened.

And that’s the brutal truth: detection is only as good as the response it triggers. A smoke alarm that no one hears doesn’t save the house.

Types of Detection Systems

Network-based monitoring, endpoint detection and response (EDR), security information and event management (SIEM), physical surveillance—each plays a role. But none eliminate human judgment. Algorithms flag anomalies, but people decide what to do. That’s why staffing and training matter. A $500,000 SIEM system is useless with a 3-person team managing 10,000 alerts a day.

Response: When the Alarm Sounds, What Do You Do?

Response is action after detection. It’s containment, investigation, communication. This is where theories meet reality. Plans look great on paper. But under pressure? Chaos reigns. Because stress distorts judgment. Because roles blur. Because systems that worked in drills fail in fire.

And yet—response is where you regain control. Not perfection. Control. A ransomware attack hits. You isolate affected systems. You notify legal, PR, law enforcement. You activate backups. None of that stops the initial damage. But it limits the blast radius. That’s what response does: it turns catastrophe into crisis. And crisis, we can manage.

Take Maersk in 2017. NotPetya hit. 49,000 laptops encrypted. Global operations froze. But their response was swift. Teams worked 24/7. They rebuilt systems from scratch. Lost $300 million—but stayed afloat. That is the power of a practiced response. Most companies don’t have it. They improvise. And improvise badly.

The Role of Incident Response Plans

Having a plan isn’t enough. It must be tested. Updated. Known. The problem is, many organizations treat it like a compliance checkbox. They write it once, file it away, and pray nothing happens. But when it does, they’re reading the manual for the first time—while the building burns.

Why Communication Is Part of Response

You can’t silence a breach. Regulators want reports. Customers want answers. The media wants blood. Delayed or vague communication escalates damage. Look at Uber’s 2016 breach cover-up: fined $148 million for hiding it. A timely, honest response would’ve cost far less. Reputation is fragile. Handling it well? That’s part of security too.

Recovery: Not Just Bouncing Back, But Learning How to Fall

Recovery is restoring operations after an incident. But it’s not just about rebooting servers. It’s about analyzing what broke, why, and how to stop it from happening again. Some companies restore data and call it a day. Smart ones do a post-mortem. Because the attack may be over, but the lesson isn’t.

Recovery takes time. Average downtime after ransomware? 22 days (Sophos, 2023). Cost per minute? Depends. For a global bank, $275,000. For a mid-sized manufacturer, $15,000. That’s not just money. It’s trust. It’s supply chains. It’s employee morale. And that’s exactly where recovery becomes strategic, not technical.

Because you can’t recover what you didn’t back up. Or what was encrypted in the backup too. That’s why the 3-2-1 rule matters: 3 copies, 2 media types, 1 offsite. Simple. But ignored. Until it’s too late.

System Restoration and Data Integrity

You restore from backup—but is the data clean? Was the malware dormant? Did attackers plant logic bombs? You can’t assume. You verify. Which means testing, validating, scanning. Recovery isn’t flipping a switch. It’s a careful, deliberate crawl back to normal.

Deterrence: The Psychology of "Maybe Not Worth It"

Deterrence doesn’t stop attacks. It discourages them. It’s the guard dog, the “protected by ADT” sign, the visible police patrol. The attacker sees the risk and thinks: “Not today.” It’s the least measurable function—but one of the most powerful.

But deterrence is fragile. It relies on perception. And perception can be faked. A camera-shaped object on a pole? Might work. Until someone gets close. Real deterrence requires credibility. That means visible measures, yes—but also a track record of consequences.

Take credit card fraud. Banks use real-time anomaly detection. If a $5,000 charge hits in Dubai while you’re in Des Moines, it’s blocked. But the deterrence? It’s invisible. You never see it. Yet it stops millions of attempts daily. It’s a bit like vaccines: you don’t feel them working—until the disease doesn’t show up.

Deterrence in Cybersecurity

Cyber deterrence is harder. Attackers are anonymous. Jurisdiction is messy. Retaliation? Rare. So we rely on other levers: public shaming, sanctions, legal threats. The U.S. indictment of Chinese hackers in 2014 sent a message. Not that they’d be caught. But that they could be. That changes everything.

Prevention vs. Detection: Which Matters More?

This debate splits security pros. Traditionalists say prevention first. Modernists argue detection is more realistic. My take? It’s a false choice. You need both. But if you had to pick one under extreme constraints? I’d go with detection. Because you can’t respond to what you don’t see. And prevention always fails—eventually.

That said, the best organizations don’t choose. They layer. Prevention slows the attacker. Detection spots them. Response contains them. Recovery fixes the mess. Deterrence makes the next one think twice. That’s the system. Break one link, and the chain snaps.

Frequently Asked Questions

Is deterrence a real security function or just a theory?

It’s real—but hard to measure. We’re far from it in cyberspace, where anonymity reigns. But in physical security, deterrence works daily. Think of bank tellers shouting “Code 99.” It doesn’t stop the robber. But it signals help is coming. That’s enough to make some flee. So yes, it counts.

Can you automate all five functions?

Partly. AI helps with detection, response triage, even prevention via adaptive access. But human judgment still rules. Because context matters. Because attackers exploit ambiguity. Because automation can’t handle the unexpected. Suffice to say: machines assist. Humans lead.

Are the five functions the same for physical and digital security?

Conceptually, yes. A firewall (prevention), motion sensor (detection), security guard response (response), restoring access (recovery), and visible cameras (deterrence)—same logic. The tools differ. The principles don’t.

The Bottom Line

The five functions of security aren’t a checklist. They’re a rhythm. A cycle. Ignore one, and the system fails. Overemphasize another, and you create weakness. The goal isn’t perfection. It’s resilience. Because threats will get through. The question is: what happens next? That’s where real security begins. And honestly? Most organizations aren’t ready.

💡 Key Takeaways

  • Is 6 a good height? - The average height of a human male is 5'10". So 6 foot is only slightly more than average by 2 inches. So 6 foot is above average, not tall.
  • Is 172 cm good for a man? - Yes it is. Average height of male in India is 166.3 cm (i.e. 5 ft 5.5 inches) while for female it is 152.6 cm (i.e. 5 ft) approximately.
  • How much height should a boy have to look attractive? - Well, fellas, worry no more, because a new study has revealed 5ft 8in is the ideal height for a man.
  • Is 165 cm normal for a 15 year old? - The predicted height for a female, based on your parents heights, is 155 to 165cm. Most 15 year old girls are nearly done growing. I was too.
  • Is 160 cm too tall for a 12 year old? - How Tall Should a 12 Year Old Be? We can only speak to national average heights here in North America, whereby, a 12 year old girl would be between 13

❓ Frequently Asked Questions

1. Is 6 a good height?

The average height of a human male is 5'10". So 6 foot is only slightly more than average by 2 inches. So 6 foot is above average, not tall.

2. Is 172 cm good for a man?

Yes it is. Average height of male in India is 166.3 cm (i.e. 5 ft 5.5 inches) while for female it is 152.6 cm (i.e. 5 ft) approximately. So, as far as your question is concerned, aforesaid height is above average in both cases.

3. How much height should a boy have to look attractive?

Well, fellas, worry no more, because a new study has revealed 5ft 8in is the ideal height for a man. Dating app Badoo has revealed the most right-swiped heights based on their users aged 18 to 30.

4. Is 165 cm normal for a 15 year old?

The predicted height for a female, based on your parents heights, is 155 to 165cm. Most 15 year old girls are nearly done growing. I was too. It's a very normal height for a girl.

5. Is 160 cm too tall for a 12 year old?

How Tall Should a 12 Year Old Be? We can only speak to national average heights here in North America, whereby, a 12 year old girl would be between 137 cm to 162 cm tall (4-1/2 to 5-1/3 feet). A 12 year old boy should be between 137 cm to 160 cm tall (4-1/2 to 5-1/4 feet).

6. How tall is a average 15 year old?

Average Height to Weight for Teenage Boys - 13 to 20 Years
Male Teens: 13 - 20 Years)
14 Years112.0 lb. (50.8 kg)64.5" (163.8 cm)
15 Years123.5 lb. (56.02 kg)67.0" (170.1 cm)
16 Years134.0 lb. (60.78 kg)68.3" (173.4 cm)
17 Years142.0 lb. (64.41 kg)69.0" (175.2 cm)

7. How to get taller at 18?

Staying physically active is even more essential from childhood to grow and improve overall health. But taking it up even in adulthood can help you add a few inches to your height. Strength-building exercises, yoga, jumping rope, and biking all can help to increase your flexibility and grow a few inches taller.

8. Is 5.7 a good height for a 15 year old boy?

Generally speaking, the average height for 15 year olds girls is 62.9 inches (or 159.7 cm). On the other hand, teen boys at the age of 15 have a much higher average height, which is 67.0 inches (or 170.1 cm).

9. Can you grow between 16 and 18?

Most girls stop growing taller by age 14 or 15. However, after their early teenage growth spurt, boys continue gaining height at a gradual pace until around 18. Note that some kids will stop growing earlier and others may keep growing a year or two more.

10. Can you grow 1 cm after 17?

Even with a healthy diet, most people's height won't increase after age 18 to 20. The graph below shows the rate of growth from birth to age 20. As you can see, the growth lines fall to zero between ages 18 and 20 ( 7 , 8 ). The reason why your height stops increasing is your bones, specifically your growth plates.