Nobody downloaded yet

Security: Threats and Security Analysis - Essay Example

Comments (0) Cite this document
Is Nuclear Disarmament Desirable and Feasible? Introduction When the Cold War was about to culminate, the world powers proclaimed a seemingly desirable, but somewhat impossible, vision—a world completely free from the threats of nuclear weapons. The value or purpose of nuclear weapons is rooted in global politics…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.2% of users find it useful
Security: Threats and Security Analysis
Read TextPreview

Extract of sample
"Security: Threats and Security Analysis"

Download file to see previous pages To be successful, such efforts must be in harmony with continuing power changes in the global system (Burke, 2009). This essay critically analyses both the desirability and the feasibility of nuclear disarmament. Overview The aftermath of the Cold War greatly influences nuclear weapon strategies until now. Especially worth mentioning are the persistence of nuclear deterrence principles and threat-based strategies. Insofar as particular threats are no longer adequate to rationalise the continuation of aggressive nuclear positions, they were perhaps required to fight off the unknown. Within the Cold War perspective, the unpredictability of the future should be dealt with by the most potent weapons (Acheson, 2010). Eventually, 9/11 pushed the threat of terrorism at the forefront; Saddam was made an unequalled threat; and Iran turned out to be a powerful catalyst of threat-based strategies. The principles of nuclear deterrence thus lasted longer than global competition and conflict between the Soviet Union and the United States (Karp, 1992). The vision of a world without nuclear weapons raises a perennial question: is it feasible? However, there is another similarly vital question that has to be addressed: what is a good alternative to nuclear power as a means to ensure the safety of the people and the security of the world? Making the world free of nuclear weapons is desirable as long as a more secure and peaceful world is truly created. How can this be made possible? Several of the barriers to progress stem from the problems of reconciling the interests of states, but others are rooted in wider disagreements in the U.S. about the desirability and feasibility of nuclear disarmament. An agreement on such issues is absent. Oppositions to nuclear disarmament are not recent, but they have resurfaced with remarkable vitality in response to Obama’s vision of a world without nuclear weapons (Kelleher & Reppy, 2011). Is it really desirable to get rid of nuclear weapons? There are arguments against nuclear disarmament which are based on the idea that nuclear weapons have contributed to the maintenance of peace and order by proving to the world powers that confrontation among them would be very damaging that it could not fulfil any valuable political goal. Within this perspective, nuclear disarmament would simply re-create opportunities for more destructive, far-reaching wars, unless the global order were efficiently restructured as to put an end to war itself (Freedman, 2009). The current state of affairs, if it could be pacified or stabilised, would be more favourable than the pursuit of eradication. However, this idea received serious criticisms. The present situation is unlikely to be stable in time, for a selective nuclear order will only be brief; more countries will desire to have their own nuclear weapons, resulting in persistent crises as states with nuclear weapons try to deter other states from developing nuclear power of their own (Chowdhuri, 2004). Another argument is that the earlier experiences with nuclear weapons do not give guarantee that the global community would be more peaceful and secure in the long run with a larger number of nuclear states. It is a fact that nuclear weapons have been absent in warfare after 1945, but there have been conflicts wherein the likelihood that nuclear weapons could be utilised has seemed to be threateningly imminent (Ritchie, 2012). A ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Security: Threats and Security Analysis Essay Example | Topics and Well Written Essays - 2500 words”, n.d.)
Security: Threats and Security Analysis Essay Example | Topics and Well Written Essays - 2500 words. Retrieved from
(Security: Threats and Security Analysis Essay Example | Topics and Well Written Essays - 2500 Words)
Security: Threats and Security Analysis Essay Example | Topics and Well Written Essays - 2500 Words.
“Security: Threats and Security Analysis Essay Example | Topics and Well Written Essays - 2500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
Threats to Global Security
...of how wars are justified and “spun” to the electorate in the West, and how they are critically appraised in the media. The internet to a large degree has as influence on this as it relates decentralized knowledge sharing on alignment groups in ways that are quicker and less expensive than traditional print or mass-media related to centralized control. In “A Violent Peace,” Paul Rogers writes: “While nuclear and other weapons of mass destruction will be major features of the coming decades, the main methods by which the world’s powerful states, especially the United States, seek to maintain their control of international security are through the appropriate use of conventional forces. Threats are seen to...
14 Pages(3500 words)Essay
IT Security Threats and Countermeasures
...IT Security Threats and Countermeasures Introduction The technological advancement has leaped mankind to another level in terms of communication, business processes, acquisition of knowledge, management etc. The invention of internet has made the whole world come closer on the same platform. The emergence of e-learning has replaced the conventional forms of educational practices with online modes of acquisition of education and collaboration. The field of business has benefitted from the introduction of e-commerce and information management systems. Alongside all the advantages of IT, there exists an appalling consequence that compels the organizations to invest hefty amounts- IT...
8 Pages(2000 words)Research Paper
Network security fundamentals, security threats, and issues
...?NETWORK SECURITY FUNDAMENTALS, SECURITY THREATS, AND ISSUES Network Security Fundamentals, Security Threats, and Issues Affiliation Date 3.1. Network Firewalls Security consists of tools, technologies, measures and laws used to ensure the safety of resources. At the present, security has become one of the biggest issues outlined by information technology firms and business organizations which connect their domestic Local Area Networks (LANs) and Wide Area Networks (WANs) to the Internet. In view of the fact that the Internet is a huge network of networks, as well as for the reason that of its basic...
4 Pages(1000 words)Case Study
Common Information Security Threats
... of protecting data utilized by various organizations. Reference Grimes, R.A (2012). “I.T’s 9 biggest security threats”. InfoWorld. Retrieved from Jenkins, B.D. (1998). Security risk analysis and management. Retrieved from Whitman, M. (2003). “Information Security”. Communications Of The ACM. Vol. 46, No. 8, 91-95. Zurich. (2008).Risk topics: Strategies for managing information security risks. Retrieved from ? Common Information Security Threats...
3 Pages(750 words)Essay
Security Threats in Louisiana
... The Mall of Louisiana is one of the biggest commercial structures located in Bluebonnet Boulevard. With more than 175 retailers, the number of visitors and shoppers per day could be thousands. As identified in PSOS (2011), “on the day-to-day level, the most common threats come from clients, employees and suppliers. Potential terrorist or criminal acts pose a threat whose impact on human and material loss could be enormous” (par. 2). In this regard, the security system for the shopping mall should encompass the following areas: a preventative intelligence infrastructure; advanced technological means; security procedures; professionally trained personnel; and inspections,...
1 Pages(250 words)Term Paper
IT security threats
...IT security threats Affiliation: Discuss global IT security threats and potentialsolutions One of the threats to IT according to CERT (Computer Emergency Response Team) program is the insider threat (from employees, contractors or even business partners) since they are in a better position to access the information system of the organization without detection ( The solutions to this are to enforce strict passwords and having account management practices as well as policies, responding quickly to suspicious and or disruptive behavior and especially on the information technology systems, enforcing stringent security access and controls and has less privileged access to users of the sensitive information systems... ...
1 Pages(250 words)Research Paper
Security Threats and Defenses
...Security threats and defenses Role of information system security The term social security in the context of organization is defined as the act in which, employees of an organization are manipulated by outsiders to rely key and confidential information details regarding an organization (Hadnagy, 2011). This information is sort by ill intentioned people for purposes of hacking computer systems or committing fraud. Social engineering is the newest form of crime in organizations and involves manipulation of the mind in hidden ways (Hadnagy, 2011). The successful operation of any organization is highly dependent on the performance of its work force. It is therefore the...
2 Pages(500 words)Essay
Security Threats and Defenses
...Security Threats and Defenses Need for security measures. Social engineering has caught on among many professionals. The techniques in use are based on cognitive biases, which are attributes of man decision making. Social engineers are aiming at exploiting these biases by creating attack techniques. Consequently, every company is at a risk of being attack by one of the many techniques in use. Preparing employees to recognize and respond to social engineering techniques will at help to protect the company in many ways, which include: 1. Use strong passwords. By using strong passwords in the computer network, they will protect the company from against unauthorized access to company’s confidential information and identity theft. 2... ...
1 Pages(250 words)Essay
Resp. Aircraft Operator Security Threats
...Aircraft Security Scenario one Regarding the case of airline baggage handler, he was not supposed to give the passenger his phone back directly because of security reasons. The main responsibilities of airline baggage handlers are different, but do not include any contact with passengers, because this would act as a loophole to insecurity from dishonest handlers. An airline baggage handler is supposed to be an operations agent. He makes sure that an aircraft carries the expected weight for a safe operation. He is also warehouse agent and processes inbound and outbound air freight. He also works as a ramp agent and makes sure that all loading bags are unloaded in time. It is also the role of the airline...
2 Pages(500 words)Essay
Threats to the Global Security
...Threats to the Global Security of the of the Introduction One of the leading sponsor of terrorism in the whole world is Iran through its financial and operational support for some groups like the Hamas, Hezbollah and many others. Through its military groups, Iran could potentially share its vast nuclear technology and expertise with extremist groups that are very much hostile to the U.S and even to the West as a whole1. A nuclear-armed Iran would promote the aggressiveness of the Iranian policy and as a result, a great confrontations erupted with the international community. Nuclear weapons that were highly accessible to the Iranian regime had a very severe repercussions for the security...
4 Pages(1000 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Essay on topic Security: Threats and Security Analysis for FREE!
logo footer
Contact us:
Contact Us Now
FREE Mobile Apps:
  • StudentShare App Store
  • StudentShare Google play
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us