GET THE APP

Journal of Defense Management

Journal of Defense Management
Open Access

ISSN: 2167-0374

Perspective Article - (2023)Volume 13, Issue 2

National Security Strategy of Security Affairs

Evrony Nobrega*
 
*Correspondence: Evrony Nobrega, Department of Defense Management, Jamia Millia Islamia University, Jamia Nagar, Okhla, New Delhi, India, Email:

Author info »

Description

A national security strategy, after it has been developed, serves as the foundation for a sizable number of subsidiary strategies and policies, each of which must have specific components. In order to accomplish the multiple objectives being sought, a credible national security strategy necessitates a deliberate synthesis of functions and tools. An ongoing duty of strategic evaluation is to carry out this synthesis; it recurs under various guises from one presidential administration to the next. The American government was having trouble combining its global objectives, responsibilities, and tools fifty years ago. It still does so today, and it will undoubtedly do so in the future.

Developing national security strategies will always be difficult and crucial, requiring high-level thinking that is comprehensive and long-sighted. The techniques described in chapters 4 and 5 can be used to develop and evaluate such plans, but the conceptualization, justification, and appraisal of a national security strategy are undertaken in broader terms than most other assessments. This chapter contends that study of national security strategy is more than ordinary strategy analysis writ large, much like chapter 5 maintains that strategy analysis is more than ordinary policy analysis writ large. It needs integrative reasoning of the most difficult kind because it calls for the mixing of several concepts and calculations.

In order to create a strong national security strategy, one cannot just put a collection of minor strategies together in the hopes of reaching coherence. Instead, one must think top down rather than bottom up. Understanding the global context and American pursuit of global objectives is the first step in strategically evaluating national security measures. Then, it is necessary to carefully evaluate how these objectives can be achieved by carrying out crucial functional tasks, each of which is accomplished by a coordinated group of instruments.

Evolution of defense-in-depth

To protect their on-site IT infrastructure in the past, the majority of businesses developed defense-in-depth strategies based on traditional perimeter-based security models. Traditional defensein-depth security strategies contain several security elements, such as

Endpoint security solutions: Antivirus programmes and Endpoint Detection and Response (EDR) technologies to protect against attacks from PCs, Macs, servers, and mobile devices, as well as Endpoint Privilege Management (EPM) solutions to control access to privileged endpoint accounts.

Patch management tools: Updated operating systems, applications, and addressing known vulnerabilities and exposures help to maintain the security of endpoints (CVEs).

Network security solutions: Employing firewalls, VPNs, VLANs, and other security measures to safeguard conventional enterprise networks and conventional on-premises IT systems.

Intrusion detection/prevention (IDS/IPS) tools: In order to avoid assaults against traditional on-premises IT systems and to uncover unwanted activity.

User identity and access management solutions: Solutions that authenticate and authorise users include lifecycle management, single sign-on, and multi-factor authentication.

National security strategies

The choice of a national security policy ultimately requires broad-scale political judgement. No analysis of a strategy can ever claim to formally or mathematically demonstrate which strategy is superior. Nonetheless, the generalisations, hypotheses, and computations that make up alternative strategies may be made more precise through strategic evaluation. So that choices may be taken with knowledge, strategic evaluation can assist guarantee that the various strategies are all internally consistent and that their distinctions, including tradeoffs, are clearly spelled out. The evaluation of how global functional activities and instruments are to operate together in order to achieve U.S. goals is essential to developing and reviewing national security plans.

As a result, this chapter describes and provides examples of analytical techniques for evaluating the crucial relationship between roles, tools, and objectives, or the relationship between means and ends. It begins by conceptually outlining this connection and emphasising the U.S. role as a global leader rather than an empire-builder. The following section outlines the three primary strategic roles played by modern U.S. national security strategy. The three primary sources of power used in this technique are then covered. Lastly, it demonstrates how many national security policies may be shaped by strategic evaluation to address a variety of global conditions, and how each strategy can be supported by a unique set of strategic concepts and theories to direct its operational actions and instrument usage.

• This chapter's main message is that the United States will be well-positioned to shape subsidiary strategies and policies in all areas of endeavour if it emerges with a national security strategy composed of coherent strategic theories in each area of major functional activity, as well as to employ its instruments and resources wisely in responding to the challenges and opportunities of the world.

• It is difficult to create such a national security plan at each historical turning point, but strategic evaluation offers a workable approach for carrying out this crucial duty.

Conclusion

The formulation of the overall national security policy can benefit from strategic evaluation, but only if it is applied in the right broad contexts. National security strategies and the underlying theories demand application of this methodology in more comprehensive ways, just as lesser-order policies and strategies must be grounded in a plausible theory of how instruments and functional activities can be used to bring about favourable consequences leading to the achievement of desired goals. Modern adjustments to tools and functionalities, as well as the optimum way to combine them, must also be carefully considered during the process.

Author Info

Evrony Nobrega*
 
Department of Defense Management, Jamia Millia Islamia University, Jamia Nagar, Okhla, New Delhi, India
 

Citation: Nobrega E (2023) National Security Strategy of Security Affairs. J Defense Manag.13:268

Received: 09-Feb-2023, Manuscript No. JDFM-23-22336; Editor assigned: 14-Feb-2023, Pre QC No. JDFM-23-22336 (PQ); Reviewed: 07-Mar-2023, QC No. JDFM-23-22336; Revised: 14-Mar-2023, Manuscript No. JDFM-23-22336 (R); Published: 21-Mar-2023 , DOI: 10.35248/2167-0374.23.13.268

Copyright: © 2023 Nobraga E. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited

Top