Deterrence: A Security Strategy against Non Traditional Security Threats to Pakistan
نویسندگان
چکیده
منابع مشابه
Pakistan Extremist Groups’ Security Threats against Islamic Revolution
Abstract In the wake of the 1979 Islamic Revolution in Iran and the ensuing dominance of political Islam discourse and its impact on Pakistani society, the ground was prepared for the spread of Wahhabism and anti-Shiism in that country due to the failure of the Islamabad government to manage the reactive conduct of extremist Salafist groups as well as its engagement in internal dis...
متن کاملSecurity Solutions against Computer Networks Threats
----------------------------------------------------------------------ABSTRACT----------------------------------------------------------The spread of information networks in communities and organizations have led to a daily huge volume of information exchange between different networks which, of course, has resulted in new threats to the national organizations. It can be said that information s...
متن کاملUsing GIS to Overcome Non-Traditional Security (NTS) Threats and Challenges
Non-traditional security, often abbreviated as NTS, is a popular but rather ambiguous concept within and outside academic circles. The NTS threats and challenges are always referred to in the context of human security to focus on the security of individuals, societies and groups, which includes criminality, environmental degradation – energy, natural disasters, infectious disease and illegal mi...
متن کاملThreats to TCP/IP Security
Because of this increased focus on network security, network administrators often spend more effort protecting their networks than on actual network setup and administration. New tools that probe for system vulnerabilities, such as IIS (Internet Security Scanner) assist in these efforts, but these tools only point out areas of weakness instead of providing a means to protect networks. Thus, as ...
متن کاملBluetooth Security Threats
Bluetooth technology has become an integral part of this modern society. The availability of mobile phones, game controllers, Personal Digital Assistant (PDA) and personal computers has made Bluetooth a popular technology for short range wireless communication. However, as the Bluetooth technology becomes widespread, vulnerabilities in its security protocols are increasing which can be potentia...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Social Sciences and Management
سال: 2017
ISSN: 2091-2986
DOI: 10.3126/ijssm.v4i4.18503