Verified Document

Enhancing US Security Essay

¶ … Bush doctrine AND THE EMERGING NATIONAL SECURITY STRATEGY The 'Bush doctrine' has diverse meanings especially in the enhancement U.S.' security. Nonetheless, the Bush doctrine is simply a defensive strategy that was created by the 43rd U.S. president, George Bush. The plan was designed and directed towards actions that should be done amidst the instantaneous danger to U.S. security. The Bush doctrine contained a number of safety principles that were termed as prongs, three of which are practical, while one is mostly impractical. The doctrine's first point held the notion that terrorists and the countries supporting them were not different and had to be treated equally. This was designed to manage countries that would pose some threat to the U.S. The second prong urged the U.S. government to take the first step of attacking the terrorists' breeding grounds before they make the first step of attacking America. This prong was supposed to change or thwart any possible attacks on the country. Moreover, the third prong urged the U.S. To attack the foes before they have empowered or enhanced their capabilities. This was to be taken as a safety measure for the protection of the country. The final prong urged the state to use the concept of freedom a tool of managing and waylaying terrorist. Such was also a strategy to contain any possible threats directed at the U.S.

With the coming National Security...

The National Security Strategy, which was updated in 2006, has different aspects as contained in the Bush doctrine. The National Security Strategy exists as a statement that sums the functions of the country as it sought to protect the American citizens and their interests. The National Security Strategy asserts that the duties and obligations of the country and the government are to manage the possible threats by using the existing powers provided by the constitution. The National Security Strategy further clarifies that with the greatness of the danger, there lies the importance of the risk of inaction. The National Security Strategy urges that in order to forestall and prevent hostile threats, the country will use every necessary action to act presumably on the rights of self-defense. Moreover, the National Security Strategy states that the country will never force its strategies to preempt threats on other nations. The National Security Strategy proceeds to say that the wish of the country is to use nonmilitary actions and succeed while it warns every country never to use preemption as a way of pretext for aggression.
The National Security Strategy is coming out strong and overcoming the existence and virtues deemed to be within the Bush doctrine. The National Security Strategy has been gaining momentum while the…

Cite this Document:
Copy Bibliography Citation

Related Documents

Security Breach Case Scenario 1: Security Breach
Words: 1969 Length: 7 Document Type: Essay

Security Breach Case Scenario 1: Security Breach Hospitals have the opportunity and responsibility to integrate sound policies and procedures in relation to the protection of the confidential client information (Rodwin, 2010). St. John's Hospital in no different to this notion has the organization seeks to enhance the security and confidentiality of the information of its clients. The organization is a role model to other institutions within the geographical area on the essential

Security Policy Document: Global Distributions, Inc. The
Words: 1891 Length: 7 Document Type: White Paper

Security Policy Document: Global Distributions, Inc. The purpose of this document is to establish key security parameters and guidelines for Global Distributions, Inc. (GDI) in order to protect the interests of the company and its clients. Scope These policies apply to all operations managed by GDI, including interactions and interfaces with client companies that are managed by GDI. All communication networks, database systems, and servers full under the purview of this policy. Policies Definition of

Security Measures and Security
Words: 1951 Length: 6 Document Type: Term Paper

Security Measures The hotel industry has experienced the need to enhance security of guests in the recent past given the increased security threats/attacks in the modern business environment. The increased focus on enhancing security in the hotel industry has represented a major shift from the serious neglect of various security responsibilities that characterized this industry in the past. According to Fischer, Halibozek & Walters (2013), hotel managers, particularly security managers, are

Security - Agip Kazakhstan North
Words: 14948 Length: 35 Document Type: Term Paper

They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and

Security Awareness the Weakest Link
Words: 8202 Length: 30 Document Type: Case Study

To offer an information security awareness training curriculum framework to promote consistency across government (15). Security awareness is needed to ensure the overall security of the information infrastructure. Security awareness programs is the can help organizations communicate their security information policies, as well as tips for users, to help keep systems secure, and the practices the entire organization should be utilizing. However, as Kolb and Abdullah reiterate, "security awareness is not

Security Balance: Control, Performance, and
Words: 762 Length: 2 Document Type: Research Paper

S. Department of Energy). Q3. Discuss the internet of things and its likely consequences for developing an enforceable information assurance (IA) policy and implementing robust security architecture. The internet of things refers to the inevitable connectedness of all things in all regions of the world through the internet. "The fact that there will be a global system of interconnected computer networks, sensors, actuators, and devices all using the internet protocol holds so

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now