Essay about Security as a Great Asset

Essay about Security as a Great Asset

Length: 1298 words (3.7 double-spaced pages)

Rating: Strong Essays

Open Document

Essay Preview

Knowledge is power. Security is the doctrine of handling knowledge, from ascertaining enemy plans and objectives to protecting the secrets of friendly forces. Through careful observation one can learn about the enemy. Someone who employs good security will be able to decide on the most efficient, safe way to achieve an objective. While risk is part if any operation, Security implies that measures be taken to minimize risk. In The Art of War Sun Tzu states that “One who knows his enemy and knows himself will not be endangered in a hundred engagements.” Security is actually a very broad subject whose purpose changes depending on where it is employed. In warfare security is both a tactical and a strategic tool used as mentioned above. Deception holds a special place in warfare security, where tricking the enemy into wasting time and resources can mean a vast advantage. Huge deceptions like the Rupert paratrooper drops and the “Man who never lived” incident of WWII protected friendly soldiers by ensuring that at least part of the enemy forces would be somewhere else. Possibly the most successful of these deception campaigns was Operation Glimmer, where Patton’s inflatable army convinced the Germans that the D-day invasion was going to occur at Calais. The multiple forms of deception employed, as well as the sheer size of the campaign kept Germany off of its guard. WWI held a much less successful run with security. The entire lost battalion incident occurred primarily as a result of a communication error made worse by friendly fire from the battalions rescuers.
The trouble with security is that it is a great asset if used well, but a great detriment if it is overdone. When the Navajo Code Talkers were first deployed to Guadalcanal, ...

... middle of paper ...

...ach that objective is, what the intentions of an opponent are and the manipulation of an opponent to offset their guard are all key uses of the doctrine in war. The subject of Security, however, expands beyond warfare. It can be used to protect a business plan or product, to define an objective in a sport or to delineate a political theory or legislature without deviating from the basic principles of understanding one’s self (Strengths, weaknesses, advantages, objectives and coordination) and the opponent (Enemy plans, movements, ideas, strengths, exploitable weaknesses and objectives). Another aspect of security, which I wish I had a good example of is understanding that not all opponents are tangible, but the same principles of comprehension apply.

Works Cited

Sun Tzu: The Art of War
Robert Kiyosaki: Rich Dad, Poor Dad.

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

Capital Asset Pricing Model ( Capm ) And Arbitrage Pricing Theory Essay

- Introduction This report discusses about the strengths and weaknesses two types of asset pricing theory - Capital Asset Pricing Model (CAPM) and Arbitrage Pricing Theory (APT). The CAPM model shows the relationship between the fair expected returns and the systematic risk of a portfolio. Figure 1 shows the formula of CAPM. The APT model also shows the relationship between the fair expected returns and risk in line with the law of one price, taking into account both systematic and unsystematic risks....   [tags: Capital asset pricing model]

Strong Essays
707 words (2 pages)

The Problem Of Poor Information Security Essay

- The rapid development of automation processes and penetration of computers in all areas of life have led to a number of specific problems. One of these problems is the need to ensure effective protection of personal information. Different ways to access information, a large number of qualified professionals, the overwhelming use of special technologies in social production allows violators to conduct activities that pose a threat to information security almost any time and anywhere. A special role in this process was played by the emergence of the personal computer in our daily live, which made computers, software and other information technology accessible to the general public....   [tags: Information security, Computer security]

Strong Essays
701 words (2 pages)

Essay about The United Nation Security Council

- The United Nation Security Council(SC) adopted Resolution 1970, 1973 and authorized some military measures toward Libya government in 2011. SC’s sanctions intervention certainly coheres the spirit of responsibility to protect. It performed an effective and important role in protecting human rights. Before the UN adopted any resolution, innocent civilians in Libya were under threat of attack. Demonstrations broke out Banghazi and spread rapidly in several cities since the middle of February. The protests and confrontations against the Gaddafi regime was unfolding since then....   [tags: Human rights, United Nations, Human security]

Strong Essays
806 words (2.3 pages)

Capital Asset Pricing Model ( Capm ) Essay

- There are a lot of items that go into buying and investing in a company. One of the hardest decisions for a shareholder is deciding if the investment is going to be profitable. Once a shareholder decides to buy or invest in an organization the next step would be deciding how much to pay or invest. Another hard decision is if the investment that was made goes bad can you get out of this obligation. Throughout the course of the paper I will illustrate some of the items that assist with this decision process....   [tags: Finance, Weighted average cost of capital]

Strong Essays
825 words (2.4 pages)

Essay about Stock Asset Returns Are Predictable Part 1

- 4. THEORITICAL BACKGROUND Since the originative works of Fama (1965 and 1970), where an efficient market from the informational execution point of view was defined as one where “stock prices ‘fully reflect’ all available information” (Fama 1970) and market efficiency was categorized into three levels: weak-form, semi-strong form and strong-form. First of all, the information set through weak form efficiency, reflects only the historical prices or returns. Second of all, the information set in semi-strong form efficiency, contains information available to all market participants....   [tags: finance, classifications, efficiency]

Strong Essays
1969 words (5.6 pages)

The Most Critical Asset Too Many Company Essay

- The most critical asset too many company is there Human resource department, they play a significant part of the organizational growth. Any company should be motivating their employee’s and retaining employees that are capable in doing what is needs for the company. Both motivating and retaining employees are essential to develop new customers and their needs as well as quality improvements throughout the company. “Motivation ranks as one of the most commonly used terms in business. Seeking to understand the nature of motivation, increase levels of motivation, and subsequently improve levels of performance has been a constant goal in management and organizational literature” (Baack, 2012)....   [tags: Motivation, Maslow's hierarchy of needs]

Strong Essays
1195 words (3.4 pages)

Risk Management And Homeland Security Essay

- Risk Management and Homeland Security Risk is present in nearly every action and decision made around the world. Decisions and plans are determined primarily through discovering the risks and finding ways to avoid them and mitigate their impact. There is no doubt that with a mission of greater importance comes greater and more numerous threats and that is why managing risks is a high priority for Homeland Security in the U.S. To ensure the best possible security and safety decisions and plans, homeland security professionals must calculate every risk and find solutions to prevent or mitigate damage they might cause....   [tags: Risk management, Risk, Risk assessment]

Strong Essays
1281 words (3.7 pages)

Security in the Computer World Essay

- INTRODUCTION The main purpose of security is to protect assets. Looking back into history, the big walls acted as a safeguard to a fortress or a kingdom. There were massive and strong doors which stopped any perpetuator from entering without permission. The same thing applies in the computer world, with the only difference being that it's virtual. There are closed networks and open networks. The closed networks are available for a person who belongs to that entity. On the other hand, open networks are available for the rest of the people....   [tags: open networks, closed networks]

Strong Essays
1126 words (3.2 pages)

Computer Networking Security Essay

- Information technology and computer networking play an important part of our everyday lives. We definitely depend on computers much more than we realize. Even for those of us who may not have a desk job, we use the computer at least a half a dozen times on our way to work. Our alarm, the coffee maker, our vehicle…almost every aspect of our life is influenced by computers. Technical support is utilized more than it should be. Several issues that the ordinary, average user faces can easily be resolved through basic “home remedies” that technical savvy computer professionals use....   [tags: Information Technolgoy]

Strong Essays
896 words (2.6 pages)

Essay about Canadian Security Intelligence Service (CSIS)

- The organization I have chosen for this essay is CSIS ( Canadian Security Intelligence Service ). CSIS closely resembles The Federal Bureau of Investigation ( FBI ) or British Security Intelligence Service. I have chosen this organization because I have great interest in becoming an employee of CSIS in the future. This essay will provide brief history of CSIS, the responsibilities of CSIS for Canada, and the application process for an entry – level position. These will be further discussed in greater detail as the essay goes on....   [tags: essays research papers]

Free Essays
1414 words (4 pages)