LeoGlossary: Security

How to get a Hive Account


security refers to the protection of people, data, and assets from various threats, such as unauthorized access, theft, damage, or disruption. It involves the use of various measures, protocols, and technologies to prevent or mitigate potential risks and vulnerabilities.

In the context of computer science and technology, security is a critical concern, as computers, networks, and data are vulnerable to various types of attacks, such as hacking, malware, and cybercrime. Security measures may include firewalls, encryption, access control, biometric authentication, and intrusion detection systems.

There are different types of security, including:

  1. Network security: This involves protecting networks and connected devices from unauthorized access, data breaches, and other cyber threats.
  2. Application security: This involves protecting software applications from vulnerabilities and attacks, such as SQL injection and cross-site scripting (XSS).
  3. Data security: This involves protecting data from unauthorized access, theft, or corruption, and ensuring that only authorized personnel have access to sensitive information.
  4. Endpoint security: This involves protecting individual devices, such as laptops and smartphones, from cyber threats and unauthorized access.
  5. Physical security: This involves protecting physical assets, such as buildings, equipment, and personnel, from theft, vandalism, and other physical threats.
  6. Identity and access management (IAM): This involves managing user identities and controlling access to systems, resources, and data to prevent unauthorized access and data breaches.
  7. Cloud security: This involves protecting data and applications stored in or accessed through cloud computing resources from cyber threats and data breaches.
  8. Internet of Things (IoT) security: This involves protecting devices and networks connected to the IoT from cyber threats and unauthorized access.
  9. Artificial intelligence (AI) security: This involves protecting AI systems and data from cyber threats and ensuring that AI systems are used ethically and responsibly.
  10. DevOps security: This involves integrating security practices into DevOps processes and tools to ensure that security is considered throughout the entire software development lifecycle.

Overall, security is a critical aspect of computer science and technology, and it requires a proactive and ongoing approach to stay ahead of emerging threats and vulnerabilities.

Finance

A financial instrument that has monetary value and can be traded. Each has a different degree of risk. There are also varying rates of return.

This can represent ownership in a company in the form of stock, a creditor relationship with a government body or a corporation represented by owning that entity's bond, or rights to ownership as represented by an option.

Types of Securities

  • Equity securities - ownership in a company, partnership, or other business endeavor. An investment of this nature generally conveys some type of control over the direction since there are voting rights.

  • Debt securities - money you’ve essentially loaned toward a project or entity. You’re entitled to regular interest and principal payments.

  • Hybrid securities - combine features of both equity and debt securities as in the case of preferred stock or convertible bonds.

  • Derivative - an asset which has its price determined by the price movement of another asset.

  • Asset Backed - a basket of similar assets that generates income. Over time, the cash flow from these assets is pooled and distributed among the different investors.

Regulation

Securities are regulated by governments.

In the United States, this started at the federal level with the passage of the Securities Act of 1933. This provided powers to write regulation, something that previously operated at the state level. Anyone who wishes to sell investment contracts to the public must publish certain information regarding the proposed offering, the company making it, and the principals in the company.

Ensuing legislation created the Securities and Exchange Commission (SEC) which became the main regulatory agencies in the U.S. Anyone who fails to adhere to the securities laws can be sued by the SEC. If there is criminal action, the case can be referred to the Department of Justice.

The regulation was intended to protect the investing public from deceptive or misleading marketing practices. The company and its principals are strictly liable for any inaccuracy in its financial statements.

One of the most common action taken by the SEC is to go after companies that fail to register the sale of securities. Recent cases against cryptocurrency companies such as Block.one was based upon the selling of an unregistered security.

Howey Test

Securities first applied to stocks and bonds. This changed in 1946 when the Supreme Court expanded the scope.

It was the introduction of the Howey Test.

The name of the test refers to the U.S. Supreme Court case SEC v. W.J. Howey Co., which was heard by the Supreme Court in 1946. It involved the Howey Company, which sold tracts of orange groves to buyers in Florida, which the buyers leased back to Howey. Company staff would tend to the groves and sell the fruit for the owners, with Howey and the land owners sharing the revenue.

Because the Howey Company didn’t register the transactions as securities in an investment contract, the SEC got involved. In SEC vs. Howey, the Supreme Court ruling determined that the leaseback arrangements qualified as investment contracts, and as such were subject to U.S. securities laws.

From this, there were 4 criteria established:

  • It is an investment of money
  • There is an expectation of profits from the investment
  • The investment of money is in a common enterprise
  • Any profit comes from the efforts of a promoter or third party

Anything that meets the Howey Test must register with the SEC.

Examples

There are a number of securities:

Returns

There are two areas of focus when it comes to return on a security.

  • Speculation - this comes from appreciation in the price of the asset
  • Yield - this is a percentage return based upon a direct payout. This could be in the form of interest or through dividends.

Bonds market participants focus upon yield, which is common in the debt markets. Since people are typical acting as lenders to the government or company, the rate is important. This could either be the coupon or yield rate.

This is typically categorized as fixed income instruments. Investors of these securities are interested in a consistent stream of payments.

Cryptocurrency

Some question whether cryptocurrencies are actually securities. The SEC under Chair Gary Gensler took the stance they are. With the exception of Bitcoin, Gensler proclaimed cryptocurrency as securities, thus requiring registration.

The fact the United States has not adopted specific regulation has put things in a gray area.

Over the last few years, the SEC took action against companies that undertook Initial Coin Offerings (ICOs). There were a number of high profile cases including the still unresolved one with Ripple.

Cryptocurrency could pose a difficult situation for regulators and applying securities laws. The decentralized nature of these assets could make the application of the Howey Test invalid.

So far the sale of digital assets has been sold with little oversight. That is likely to change as governments around the world implement laws to regulate them.

The question is how the technology will change things especially when it comes to decentralized finance (DeFi).

Another issue arises with the different forms of crypto assets. Not all cryptocurrency is identical.

There are:

View a fungible token like a security is the approach the SEC took. How does this apply to non-fungible tokens which are individual assets that can apply to a variety of things. This can be both in the digital and physical realms.

NFts are purchases considered by many to be part of the software ecosystem. Thus, there is not the "expectation of profit" in many of these instances, the bubble of 2020-2021 aside.

There we have stablecoins which are designed to mimic the medium exchange component of currencies. There is no little speculation since the idea is price stability.

Exchanges

Most securities are traded on exchanges. These are centralized exchanges which are owned by particular companies. One of the features of cryptocurrency is the introduction of decentralized exchanges.

Some of the better known exchanges are NYSE, NASDAQ, and CME.

Brokerage firms connect into the exchanges, allowing for the merging of buyers and sellers. All aspects of the securities industry are run by financial institutions. For many securities, larger investment banks will operate as market makers to ensure liquidity on the exchange.

General:

H2
H3
H4
3 columns
2 columns
1 column
Join the conversation now
Ecency