Enhancing US Security Essay

¶ … Bush doctrine AND THE EMERGING NATIONAL SECURITY STRATEGY The 'Bush doctrine' has diverse meanings especially in the enhancement U.S.' security. Nonetheless, the Bush doctrine is simply a defensive strategy that was created by the 43rd U.S. president, George Bush. The plan was designed and directed towards actions that should be done amidst the instantaneous danger to U.S. security. The Bush doctrine contained a number of safety principles that were termed as prongs, three of which are practical, while one is mostly impractical. The doctrine's first point held the notion that terrorists and the countries supporting them were not different and had to be treated equally. This was designed to manage countries that would pose some threat to the U.S. The second prong urged the U.S. government to take the first step of attacking the terrorists' breeding grounds before they make the first step of attacking America. This prong was supposed to change or thwart any possible attacks on the country. Moreover, the third prong urged the U.S. To attack the foes before they have empowered or enhanced their capabilities. This was to be taken as a safety measure for the protection of the country. The final prong urged the state to use the concept of freedom a tool of managing and waylaying terrorist. Such was also a strategy to contain any possible threats directed at the U.S.

With the coming National Security...

...

The National Security Strategy, which was updated in 2006, has different aspects as contained in the Bush doctrine. The National Security Strategy exists as a statement that sums the functions of the country as it sought to protect the American citizens and their interests. The National Security Strategy asserts that the duties and obligations of the country and the government are to manage the possible threats by using the existing powers provided by the constitution. The National Security Strategy further clarifies that with the greatness of the danger, there lies the importance of the risk of inaction. The National Security Strategy urges that in order to forestall and prevent hostile threats, the country will use every necessary action to act presumably on the rights of self-defense. Moreover, the National Security Strategy states that the country will never force its strategies to preempt threats on other nations. The National Security Strategy proceeds to say that the wish of the country is to use nonmilitary actions and succeed while it warns every country never to use preemption as a way of pretext for aggression.
The National Security Strategy is coming out strong and overcoming the existence and virtues deemed to be within the Bush doctrine. The National Security Strategy has been gaining momentum while the…

Cite this Document:

"Enhancing US Security" (2015, January 16) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/enhancing-us-security-2148311

"Enhancing US Security" 16 January 2015. Web.25 April. 2024. <
https://www.paperdue.com/essay/enhancing-us-security-2148311>

"Enhancing US Security", 16 January 2015, Accessed.25 April. 2024,
https://www.paperdue.com/essay/enhancing-us-security-2148311

Related Documents

Security Breach Case Scenario 1: Security Breach Hospitals have the opportunity and responsibility to integrate sound policies and procedures in relation to the protection of the confidential client information (Rodwin, 2010). St. John's Hospital in no different to this notion has the organization seeks to enhance the security and confidentiality of the information of its clients. The organization is a role model to other institutions within the geographical area on the essential

Security Policy Document: Global Distributions, Inc. The purpose of this document is to establish key security parameters and guidelines for Global Distributions, Inc. (GDI) in order to protect the interests of the company and its clients. Scope These policies apply to all operations managed by GDI, including interactions and interfaces with client companies that are managed by GDI. All communication networks, database systems, and servers full under the purview of this policy. Policies Definition of

They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and

To offer an information security awareness training curriculum framework to promote consistency across government (15). Security awareness is needed to ensure the overall security of the information infrastructure. Security awareness programs is the can help organizations communicate their security information policies, as well as tips for users, to help keep systems secure, and the practices the entire organization should be utilizing. However, as Kolb and Abdullah reiterate, "security awareness is not

S. Department of Energy). Q3. Discuss the internet of things and its likely consequences for developing an enforceable information assurance (IA) policy and implementing robust security architecture. The internet of things refers to the inevitable connectedness of all things in all regions of the world through the internet. "The fact that there will be a global system of interconnected computer networks, sensors, actuators, and devices all using the internet protocol holds so

With the threat of terrorism remaining so strong in this country it is vital to find new and better ways to protect people and to keep them safe from harm as much as is humanly and technologically possible. Scope of the Study The scope of this particular study is very broad and far-reaching, because there are so many people who are being affected by it now and will be affected by