Present Condition Of World N Security Issues

1501 words - 7 pages

Delegate of The Republic of India

INDIAwas an old civilization with great cultural resourses, which however was stratified socially,economically and politically.It's located in South of Asia in the world map .The neighbouring countries of India are PAKISTAN, BANGLADESH,CHINA,SIRLANKA and BHUTAN. India is a democatratic and secular state.The present PrimeMinister of inda is MANMOHAN SHING and the President is SHRI PRANAB MUKHER JEE.The current political poition of India is very good in light of the most intellectual finance man in heading the government i-e SIR MANMAOHAN SINGH. He is enjoying with the reforms what he introduced when he is in the ...view middle of the document...

Factors influencing indian's foreign policy has been to secure itself and stragtegic autonomy so that it can pursue it's national interest.INDIA'S critical security concerns are:-
External security
Internal security
Sustained economic growth
Maritime security
Acess to technology
TOO many miltary bases are exists in the world .More than 1,000 in 63 different countries. DUE to increasing in the number of these bases number of foreign conflicts are also increasing day by day. Some countries increasing their number of bases all over the world because they wants their dominec over the rest of the world. LIKE US has more than 500 miltary bases all over the world.ON the other hand India has only one military base tha is AYNI MILITARY BASE in tajikistan .THE AYNI air basa in tajikistan happens to be india's first military base and yet india has not been able to make AYNI truelly a foreign military base that compite the other miltary base around the world .
According to the present world condition.there are four very different emerging powers CHINA,INDIA,BRAZIL and SOUTH AFRICA.
China: global power
India: great power
Brazil: medium global power
South africa: medium continental power
Major foreign bases are limited in number, mainly in Europe and the Pacific/Asia. Some bases have been closed in recent BRACs, but others have been realigned and merged with other posts, or transferred to our allies with a limited compliment of U.S. personnel. I would also add that bases in Alaska and Hawaii are considered overseas assignments, even though they firmly reside in two states.

The joint basing plan of the BRAC is already underway, and we'll probably see the closure of a few more installations within the next five to ten years. Much of the present concern is developing because of emerging threats, and with our forces and defense budget tied up in Iraq and Afghanistan, maintaining our technological edge is growing more difficult. It's not so much that people are crying wolf as long-term vision on what we should expect within the next half-century.
Some countries are foucusing on their number of military bases, all over the world beacuse they need their dominence all over the world.Some military bases may also play positive role .They become in a position to look after their political and ecnomical intrests , thus they enjoy dominence in the country and atlarge in the region.These bases are a great threat to the country and to the region because , the clash of the intrests may result in a world war.
Although military bases have become a need for the gret powers of the world but, the prime purpose of such bases should to safegaurd the econmomic intrest not to enjoy domience in the region.
These military bases should be establish with the bilateral consus and, they should not be a threat to region.
Number of these bases should be limited and according need.

Other Papers Like present condition of world n security issues

The State Of Food Insecurity In The World

2562 words - 11 pages Food security is an urgent subject that has been extensively debated in scientific fields. Considering the main definition of food security already presented, food insecurity exists when people do not have condition to ensure their food security. Despite the fact that food insecurity is usually associated with hunger, underweight, and undernourishment, we can assume that food insecurity is also related to nutritional disorders like

Ch1 Comp Security Essay

2308 words - 10 pages |c.|Data| b.|Computer system|d.|Information| ANS: B PTS: 1 REF: 3 3. In information security, ____ exists when a vulnerability known to an attacker is present. a.|threat|c.|risk| b.|loss|d.|exposure| ANS: D PTS: 1 REF: 4 4. Which term identifies a single instance of an information asset suffering damage, unintended or unauthorized modification, or disclosure? a.|Exploit|c.|Vulnerability| b.|Exposure|d.|Loss| ANS: D PTS

Cyber Security: Physical and Digital Security Measures

3505 words - 15 pages addressing those issues and plugging up those security holes. In addition, the organization should look to the review of their policies and procedures, determining the effectiveness of current policies and procedures and whether or not there are any security holes present there as well. Finally, policies and procedures should be put in place to complete threat assessments or risk assessments of the current physical security aspects of the organization on

Chapter 10 Finance

5385 words - 22 pages Chapter 10 Discussion Questions 1. The valuation of financial assets is based on the required rate of return to security holders. This, in turn, becomes the cost of financing (capital) to the corporation. 2. The valuation of a financial asset is equal to the present value of future cash flows. 3. Because BCE, Inc. has less risk than Air Canada, BCE, Inc. has relatively high returns and a strong market position; the latter

Risk Management

650 words - 3 pages condition of the United States is not well either. Although it was the largest manufacturer in the world but at present it is in fifth place. Currently importing is much higher in this country than export. The country is selling asset as well as taking debts to maintain current living standard. The international competitors are planning to make the country completely dependent on foreign productions. As a result the United States firms are

Apple Inc 2008


Law and Ethics

564 words - 3 pages agency n  Almost all contract law is state law q  Statutory and Common law 6-8 Elements of Contract Formation n  Agreement q  q  q  Offer Acceptance “mailbox” rule 6-9 Elements of Contract Formation n  Consideration q  q  q  Past, Present, Future issues Pre-existing duty issues Modification issues 6-10 Elements of Contract Formation n  Legality Capacity q  q  n  Age Mental

Article I Want

5460 words - 22 pages you should be willing to pay for the car is $8,791, since if you paid more than that amount, you would be receiving less than your required 6% return. P6-13. Valuation of assets LG 4; Basic Asset End of Year Present Value of Cash Flows Amount A 1 2 3 $ 5,000 $ 5,000 $ 5,000 B 1– C 1 2 3 4 5 0 0 0 0 $35,000 N 5, I 16 FV $35,000 $16,663.96 D 1–5 6 $ 1,500 8,500 N 6, I 12, PMT

From Traditional to Critical Security

704 words - 3 pages security * Refer to lecture slides Factors infulecing the emergence of human security * Refer to lecture slides * Chpt 27 of textbook Changing nature of security * End of cold war lead to a changing world which includes the security that the states face. * After the 911, the terrorist did what nobody could do, attacking the US land. * State failure such as Iran and North Korea has been deemed a significant threat. These state failures has a higher rate of security issues. * Refer to lecture slides. Managing security issues * States are more willing to go on missions to help other countries. * Refer to lecture slides.

Global Security Policy - Week 5 - Cmgt-400

969 words - 4 pages Global Security Policy CMGT-400 Monday, May 11, 2015 Vijay Bhaskar Jonnalagadda Global Security Policy Organizations with offices in multiple countries have to strategically implement personnel, logistics, network configurations, and inventory; but they also have to create a security plan to secure these assets to keep their customer, brand integrity, and profits. Some of the issues faced while maintaining security for a company in

Course Discription

968 words - 4 pages Objectives 1.1 Recognize the importance of IT security implementation. 1.2 Identify major security issues associated with physical and operating system security. 1.3 Describe basic advantages and disadvantages among the various security implementations. Course Preparation Read the course description and objectives. Review the Learning Team Toolkit. NOTE: TestOut LabSims are available for this course. See Week One, Course Materials Page

Related Essays

The Effects Of Cloud Computing On Enterprises N Terms Of Cost And Security

1257 words - 6 pages . But platforms based on cloud computing will also have barriers like providing and maintaining security and having few privacy issues as most of the data can easily be shared among cloud and accesses by different devices ( David Linthicum,2014) So it is very important to maintain the correct authorization so the data won’t be misused. As mentioned about the important factors of cloud computing. This paper will be focusing on the cost and security

Unit 10 Assignment 1: Examine Real World Implementations Of Security Standards And Compliance Laws

525 words - 3 pages UNIT 10 ASSIGNMENT 1: EXAMINE REAL-WORLD IMPLEMENATATIONS OF SECURITY STANDARDS AND COMPLIANCE LAWS CIPA stands for The Children's Internet Protection Act. It is a bill that was signed into law in December 2000, and was to be constitutional by the United States Supreme Court in June 2003. It requires schools K-12 and libraries to have internet filters to protect children from harmful online content that blocks access to “visual

Discuss The Issues That Separatism Has Brought To Different Areas Of The World

1063 words - 5 pages Discuss the issues that separatism has brought to different areas of the world (40 Marks) Separatism is an attempt by a regional group within a country or across the borders of one or more countries, to gain more political control from central governments over the areas in which they live. There are many different reasons for why separatism occurs around the world, these can include: the feeling of being economically inferior to other areas

Give An Overview Of Past, Present And Possible Future Concerns Of Development Planning In The Third World By Providing The Following

1312 words - 6 pages 1 ASSIGNMENT NO 2 UNIQUE NUMBER 578319 Give an overview of past, present and possible future concerns of development planning in the Third World by providing the following  A description and discussion of the focus of development planning since the 1940s  A discussion of either gender or globalization as a contemporary development problem that will influence development planning in years to come TABLE OF CONTENCE 3