Top-Rated Free Essay
Preview

Security

Good Essays
1204 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security
Outline:
1. Security, definition and nature, comprehensive security
2. Introduction to strategic studies, definition, nature and scope of strategic studies
3. Development of modern strategies and its various dimensions
4. The phenomena of war
5. Military alliances in IR
6. Deterrence, conceptual analysis
7. Nuclear deterrence (Nuclear Doctrine)
8. Problems of Disarmament and arms control
9. Nuclear proliferation and nuclear strategies (Nuclear Doctrine)
10. Defense and policy of Pakistan
Security:
• The state of being from a danger or injury
• Freedom from fear, anxiety
• Security is the degree of protection against danger, loss and criminals
• Security is a negative term
Concept of security:
There are two categories or school of thoughts
Traditional concept of strategy and non-traditional concept of security
Traditional concept:

1. The traditional concept is that giving stress on the importance of state security
2. state is a main actor in international relations
3. traditionalists give stress on the attainment of more and more military power
4. they believe that war is only solution to any international conflict
5. they believe on hard politics
Non-traditional concept:
1. Concept of security is the social security
2. They believe that non-military issues such as economy, trade, environment, terrorism gain much more importance
3. War is not a solution to any conflict. It can be solved by peaceful means
4. Believe on soft politics.
National power:
Its components are
Political, economic and military

Comprehensive security:

Security is a negative term connotes the absence of rare and perceived threats stemming economic disparities and social inequalities to certain coveted values.
State seeks national power e.g. political, economic situation and military, generate prosperity.
Political-economic cooperation:
This relationship itself paves the way for comprehensive security. (increase in population and certain environmental issues)
Core values:
National security and state survival
Internal and external threats:
• Physical boundaries
• Insurgency movements (not legally recognized)
• Deprivation of essential goods
• International sanctions

Internal threats:
1. Economic situation
2. Political situation
3. Ethnic issues
4. Social issues
5. Revolution
6. Subversion ideas
Conclusion (Comprehensive security)
Comprehensive acquired that a state should protect its citizens as well as to provide economic and social opportunities with a view to improve the quality of life of its citizens. -------------------------------------
Lecture No.2
Strategy and Tactics
Strategy and tactics are two terms used in war. These are interlinked
Strategy:
It is the theory of the use combat for the object of war
Tactics:
It is the theory of the use of military force to combat.
Strategy is mind planning----------forces are tactics
Warfare based on deception, who are able to attack
1. We must seen unable
2. When using our forces we must seen inactive
3. we must make the enemy believe that we are away when for away, we are near.
Grand strategy:
Strategy is the application on lower plan of general grand strategy
General strategy looks beyond the war to the subsequent instruments but to regulate their use as to avoid danger to the future state of war.
 Combat= use of force morally
 Tactics is the application of strategy on lower plan
 The theater of war is the province of strategy while the field of battle is the province of tactics.
Elements of strategy:
1. Moral, 2. Physical, 3.Mathematical (Statistically), 4.Geographical
Types of strategy:
1. Modern strategy
Advance strategy is modern strategy, social media, advent of nuclear bomb, modern technology
2. Indirect strategy
On deception to cut the enemy line of communication, supply lines stoppage, destruction of head offices and sanctions.
3. Interior and exterior maneuvers
Interior= Geographical location is defined
Exterior= Geographical location is not defined
4. Annihilation strategy
Complete destruction e.g. Hiroshima and Nagasaki.
5. Exhaustion strategy
Capacity minimized, de moralizing through propaganda

Modern strategy:
The art of the employment of battles as a mean to gain the objective of war. The practical adoption of means placed at a general’s disposal to the attainment of the objective in view.
Liddell Hart:
The art of distributing and employing military means to fulfill the ends of policy.

Strategic thought process:
• Cycling in nature
• Identifying the conflict
• Deciding the policy
• Deciding the strategy to achieve policy objective
• Putting strategy into action
Framework of strategic thought process:
1. Interest
2. Objective
3. Available resources
4. Environment
5. Point of time or time to time, there can be starting time but no ending time can be mentioned
Timeframe work:
There are two types in this regard
1. Short time----- it can be up to 2-5 years
2. long time—
Deterrence and detente are modern strategies
--------------------------------------------------------------------

Lecture No. 3
WAR

(Aggression, societal disturbance, legitimate instrument)
 War as a substantial armed conflict between organized military forces of independent political unit.
 War is an extreme intensification of military activity, psychological tension, legal power and social integration.
 War is an act of violation, violence intended to compel our opponents to fulfill our will.
Causes of war:
a. War for wealth
b. War for land
c. War for power
d. War for security
e. Religious causes
f. Strategic territorial
g. Economic
h. FDI
Types of war:

 Total war: war of total population, war by total population, war against total population, war for total stakes.

 Nuclear war: can go towards total war, use of nuclear weapons

 Limited war: area is defined in limited war

 Pre-emptive war: without being attacked or attack

 Guerrilla war: organize group, in Kashmir attacks

 Civil war: between two groups, masses and government, to achieve specific objective

Lecture No. 4
Nuclear development in Pakistan
Threat perception are products of general factors including a nation’s traditional views itself and its historical experiences that geo strategic environment/ location, hostility with other state especially its neighbors the strength or weakness of the policy and its education system.
• Atomic energy institute in Karachi was established in 1955
• After 1965 Indo-Pak war Z.A. Bhutto started working on nuclear program
• India in 1974 nuclear explosions
• Pakistan in 1984 announced nuclear technology production
• In 1987 Pakistan achieved nuclear capabilities and finally 1998 nuclear explosions by Pakistan
Mr. Johan Mallot policy for South Asia:
• Reducing of tension in this region
• Increasing regional stability
• Promotion of NPT

USA steps to reduce the expansion or its efforts to promote NPT

Test bane: India and Pakistan have both declared voluntary states on further testing.

Fissile material: To prevent accumulation of fissile material

Strategic restraints: Restraints in the development of massive and aircraft capable of caring WMD

Export control: Tightening export control on sensitive material and technology India-Pakistan dialogue: Productive dialogue between both the India and Pakistan. Role of G-8:
G-8 are= Canada, France, Germany, Japan, USA, Russia, Italy, Britain
• WMD delivery system to be stopped
• Collectively sanctions on India and Pakistan
G-8 Steps for South Asia:
1. G-8 will be able to play any tangible role in changing the nuclear status qu in South-Asia.
2. The management of Pakistan and India will be concern of G-8
3. The G-8 will offer financial incentive to India and Pakistan to keep their nuclear weapons program at minimum level.
4. Purse contradictory policy might be continued.
Role of china or policy of China:
Dual role, against in Security Council and on the other hand motivated Pakistan to do so.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Physical Security

    • 272 Words
    • 2 Pages

    This paper is to outline Riordan Manufacturing’s existing Information Security Systems, determine their weaknesses, and develop solutions to those weaknesses by addressing security issues in the areas of physical, network, data, and the web.…

    • 272 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Safe Guarding

    • 1193 Words
    • 5 Pages

    1) Complete the following chart. Ref 3.1 (If you have completed this in a class activity you do not need to answer) Completed in Class…

    • 1193 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Security Brutallitay

    • 845 Words
    • 4 Pages

    Before the year 2000 airports were smooth transportation services. People could enter an airport and basically walk right on to their planes without being hassled by airport security. Air travel safety precautions changed dramatically after the September 11, 2001, terrorist attacks that targeted passenger planes in the United States. After many years of upping security in airports, the Transportation Security Administration knew that metal detectors weren’t enough to pick up all dangerous weapons and explosives. In 2007, the Transportation Security Administration began distributing body scanners to use at security checkpoints in airports throughout the United States. Travelers were outraged when they were told the scanners could produce pictures that could see through their clothes. These scanners and new security procedures should not be allowed to be operational in the United States because they invade personal privacy and slow down the flow of travelers.…

    • 845 Words
    • 4 Pages
    Good Essays
  • Good Essays

    safeguarding

    • 947 Words
    • 4 Pages

    Practitioners always plan what they’re going to do in order to meet childrens needs, to think about how they are going to achieve the particular task, how it’s going to benefit the child, what they are going to learn from it, is it appropriate and what will it’s short term and long term outcomes be. “Planning starts with observing children in order to understand and consider their current interests, development and learning. Contains table, which shows how the principles of Early Years Foundation Stage (EYFS) support pupils' development and learning” (http://nationalstrategies.standards.dcsf.gov.uk/node/84344). For practitioners to meet care and learning needs of children they often observe children in different experiences to see what their initial reaction would be this helps them to have a clearer view what the interests and likes of the child(ren) may be also what they may not enjoy and possibly won’t benefit from if this was set as a particular activity for them. As part of the EYFS there is a planning cycle that practitioners may follow in order to help plan out their observation.…

    • 947 Words
    • 4 Pages
    Good Essays
  • Good Essays

    safeguarding

    • 4973 Words
    • 29 Pages

    this workbook, you are learning about the different things that make up your job role.…

    • 4973 Words
    • 29 Pages
    Good Essays
  • Satisfactory Essays

    Safeguarding

    • 291 Words
    • 2 Pages

    • the welfare of children must be the paramount consideration when the courts are making decisions about them;…

    • 291 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    War doesn't fix everything. It can fill the void for some people, people that want to stand tall and address the duty of fighting for their country. But for others, it can simply empty it, destroy everything they've ever…

    • 535 Words
    • 3 Pages
    Good Essays
  • Good Essays

    safeguarding

    • 2007 Words
    • 6 Pages

    Prevention is to inform an individual about all types of abuse and how to recognise the signs. Also to inform the individual how to seek help and who to seek help from. We train staff how to recognise abuse and how to take action to prevent abuse. It also means that the professionals recognise when things are not right and act early.…

    • 2007 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Security and Privacy

    • 1863 Words
    • 6 Pages

    The cleaning staff was scene reading documents that were thrown in the trash while performing their cleaning duties. Technically the cleaning staff was not violating any laws because the printouts were tossed into the trash which makes them public information. With that being said the cleaning staff should be…

    • 1863 Words
    • 6 Pages
    Better Essays
  • Best Essays

    Safeguarding

    • 1887 Words
    • 8 Pages

    Batty, D. (2001). Timeline for the Climbie Case. 24 September. [Online] Available from: http://www.guardian.co.uk/society/2001/sep/24/childrensservices) [Accessed 13 November 2013]…

    • 1887 Words
    • 8 Pages
    Best Essays
  • Better Essays

    Safeguarding

    • 2781 Words
    • 9 Pages

    P4/ Outline key legislation and regulations which govern safeguarding adults work. In this part of the assignment I will be stating the main key points of each piece of legislation and how it is applied in practice. Safeguarding Vulnerable Adults 2006This piece of legislation was introduced on the 8th November 2006, the whole idea of this act is to protect adults who are at risk of abuse due to a vulnerability. For example, someone with Down syndrome may be more at risk of getting abused due to their lack of social skills and knowledge. The key points of this legislation are~…

    • 2781 Words
    • 9 Pages
    Better Essays
  • Satisfactory Essays

    Security

    • 409 Words
    • 2 Pages

    Michael Nhan SE578-Practices for Administration of Physical & Operations Security Prof: Rodney Smith How do Administrative, Technical, and Physical Controls introduce a false sense of security? According to research and studies, the leading broadband providers have accumulated a total of over 17.4 million high-speed Internet subscribers in the US” This means that in the United States alone there are more than 17 million computers with fast connections most of which are connected to the Internet 24 hours a day, 7 days a week and that number continues to grow. Having a false sense of security is very common among consumers who own and operate a PC within their homes. Nothing is ever secured. I would never say something is secured within the terms of information security. Administrative, Technical, and Physical introduce a false sense of security by the idea of what we use to safeguard sensitive data and protect consumers’ privacy. The idea of purchasing a virus protection identifies that all personal information will be safeguarded and protected, which gives consumers a false sense of security. Having a false sense of security means that I entrust beliefs that I’m guaranteed protection at all times and, that I should not be concerns about my computer being compromised because I took the necessary precautions in purchasing a virus protection. What are the consequences to the strategy if there are no verification practices? disclosure of proprietary corporate information. What can a firm do to bolster confidence in their Defense-in-Depth strategy? How do these activities relate to “Best Practices”? How can these activities be used to demonstrate regulatory compliance? Sarbanes-Oxley_Act. (n.d.). Wikipedia, the free encyclopedia. Retrieved September 21, 2008, from Reference.com website: http://dictionary.reference.com/browse/Sarbanes-Oxley_Act M2PressWIRE; 08/12/2008 Dublin: “Data New Report Details the Data Center Automation Solutions Market for 2007-2010"…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    security, inaction, like a due date a long time in the future. There is always tomorrow so we…

    • 1179 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Safeguarding

    • 738 Words
    • 3 Pages

    It is essential that all professionals working with children and young people are fully aware and understand their roles, duties and responsibilities defined by their setting that comply with the legislation, guidelines, policies and procedure in their home nation. The primary piece of legislation from the UK is United Nations Convention on the Rihts of the Child 1989, ratified in 1991 UK. This convention, although is binding to british governments, it is not formally a part of british law. In England, safeguarding legislation also includes, Working Together to Safeguard Children 2010, a legislative framework that stipulates how individual practitioners and organisations work together to promote and protect the welfare and wellbeing of children…

    • 738 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The whole system is more important than the individual state. Even though a state’s primary goal is to secure and maintain security and its national interest, but state must act and play around under international norms and regulations, which means it limits their certain interests. In reality, states tend to accumulate power such as military , economically etc in order to secure their survival, while power gives a capacity to play as equivalent on the international level. As Waltz argues that, states must rely only on themselves to avoid and protect themselves from any potential risks or threats that posed by their opponents. Yet state’s stability creates insecurity for others. Thus, it is inevitable that, states, as a defensive actors, they react to external forces and create conflicts with each other according to how the system is established or how the table is arranged. Furthermore, in terms of anarchy, he explains how the war is always possible by illustrating how external forces or situations push states in one direction or another. Nonetheless the billiard balls are same, states differ from each others in terms of its size and power. Neorealist scholars note that international politics is the structural system, thus only limited superpowers are worth to form and…

    • 851 Words
    • 4 Pages
    Good Essays