image

Security Studies

 

What is the specialty of Security Studies:

Security Studies, also known as International Security Studies, is an academic sub-area within the broader discipline of international relations that studies organized violence, military conflict, and national security.

While the field (such as the original field of international relations) is often aimed at educating students looking for professional jobs in think tanks, consultants, defense contractors, human rights, or in government service positions focused on diplomacy, foreign policy, conflict resolution, and prevention, emergency, and disaster management, intelligence and defense, it can also be designed for students seeking academic research professionally within academia, as intellectuals or critics.

History of Security Studies Specialization:

The modern field of security studies originates from the period between World War I and World War II, and Quincy Wright's 1942 book, The Study of War, was the culmination of a major collaborative research project dating back to 1926. Scientists such as William T.R. Fox, Bernard Brody, Harold Laswell, Eugene Staley, Jacob Finnier, and Vernon Van Dyke were involved in the project, and courses in security studies were offered at Columbia University, Princeton, University of North Carolina, Northwestern, Yale, and the University ale in the 1940s. Think tanks, such as the RAND Foundation, played an influential role in post-World War II security studies in the United States, and this area developed rapidly in international relations during the Cold War, examples from that era including the academic work of realism in the mid-twentieth century. Political scientists such as Thomas Schilling and Henry Kissinger, who focused mainly on nuclear deterrence.

Some scientists have called for the expansion of security studies to include topics such as economic security, environmental security, and public health. Stephen Walt argued against this expansion, saying it would undermine the intellectual cohesion of the field. While the field is mostly contained within political science and public policy programs, it is increasingly common to adopt a multidisciplinary approach, incorporating knowledge from the fields of history and geography (with a focus on classical geopolitical geography), military science, and criminology.

The field of security studies is associated with strategic studies and military science, both of which are published frequently in security studies journals.

The importance of studying the specialty of Security Studies:

Security researchers and security research are commonly referred to, respectively, as "hackers" and "hackers." Such words can bring back negative connotations, such as bastards wearing hoods in dark rooms lit only through the glare of a computer screen. This stereotype is far from the truth. Certainly, there are harmful individuals attacking computer systems and networks for a variety of motives every day. However, security research and security researchers are increasingly important for protecting against such attacks, as well as pre-emptively assessing and repairing flaws in the fabric of our digital infrastructure. 

In this report, we compare four areas where computers and networks play an increasing role: cars (section 2), medical devices (section 3), voting machines (section 4), and Internet of Things devices (section 5). . We show that the efforts of security researchers have been instrumental in finding and repairing flaws in these systems, such as security gaps and errors that could have resulted in significant damage, economic loss, and loss of confidence in digital infrastructure.

We also described the complex consequences of the detection of defects. The security seeker simply finds no flaw, tells the manufacturer, and asks the manufacturer to fix it. Wherever we can, we assess whether and how long a particular defect has been repaired. As discussed in the previous CDT report, there is a complex set of special laws and incentives that may make it difficult for the researcher to engage the manufacturer and the manufacturer to fix a quickly reported flaw.

While we try to be detailed in the examples mentioned in each section, this is not an exhaustive list. Simply put, there are a lot of errors and flaws that are either undetected or that may be detected and not detected or detected in particular. Instead, these case studies show that security research is an essential and important element of a robust and dynamic electronic security system - a system that moves quickly to fix design and implementation flaws in systems that mediate our lives every day. While many of the examples we are discussing have not been quickly fixed, it is clear from this evidence that we must be very careful not to discourage security research.

Fields of work for the Security Studies major:

  • Air Force officer
  • Army officer
  • Emergency management specialist
  • Smart analyst
  • IT Security Specialist
  • Navy officer