Security: Difference between revisions

From ACT Wiki
Jump to navigationJump to search
imported>Doug Williamson
(Update link.)
imported>Doug Williamson
(Add links.)
Line 32: Line 32:
== See also ==
== See also ==
* [[Alienation of assets]]
* [[Alienation of assets]]
* [[Bearer security]]
* [[Bells and whistles]]
* [[Bells and whistles]]
* [[Bond]]
* [[Bond]]
Line 40: Line 41:
* [[Collateral agreement]]
* [[Collateral agreement]]
* [[Controls]]
* [[Controls]]
* [[Cyber security]]
* [[Debt security]]
* [[Debt security]]
* [[Deep discount issue]]
* [[Deep discount issue]]
Line 51: Line 53:
* [[Fixed charge]]
* [[Fixed charge]]
* [[Floating charge]]
* [[Floating charge]]
* [[Food security]]
* [[Hybrid]]
* [[Hybrid]]
* [[Information security management system]]
* [[Information security management system]]
Line 82: Line 85:
* [[Secured debt]]
* [[Secured debt]]
* [[Securitisation]]
* [[Securitisation]]
* [[Security Market Line]]
* [[SFT]]
* [[SFT]]
* [[Share]]
* [[Share]]
Line 90: Line 94:
* [[Traded option]]
* [[Traded option]]
* [[Tranche]]
* [[Tranche]]
* [[Transport Layer Security]]
* [[Undated]]
* [[Undated]]
* [[Undervalued]]
* [[Undervalued]]

Revision as of 15:47, 28 April 2022

1. Collateral.

Assets pledged by a borrower, as additional protection for the lender's interest.

For example a residential mortgage loan, for which the security is the residential property mortgaged to the lender.


2. Credit risk - legal risk - commercial risk.

Other improvements to the legal or commercial position of a lender or another party, particularly in relation to credit risk.


3. Stocks - shares - similar assets.

A tradeable legal claim upon the assets of the issuer of the security.

Examples of traded securities include shares and bonds.


4. Safety - confidentiality.

Safety, including both physical safety and - for example - the confidentiality of information.


5. Controls - systems - procedures.

Systems and procedures to improve safety.

Including for example both physical access controls and electronic controls such as encryption and passwords.


See also