The identification of potential security threats through various means, including manual procedures and automated systems, to prevent harm or unauthorized access.