Global Information Lookup Global Information

Security assurance information


A security assurance, in the context of nuclear warfare, is an expression of a political position by a nuclear-armed nation intended to placate other non-nuclear-armed nations. There are two types of security assurance: positive and negative.[1] A positive assurance states that the nation giving it will aid any or a particular non-nuclear-armed nation in retaliation if it is a victim of nuclear attack. A negative assurance is not the opposite but instead means that a nuclear-armed nation has promised not to use nuclear weapons except in retaliation for a nuclear attack against itself (a policy known as No first use).

Security assurances are a key part of nuclear diplomacy, and since they are statements of intent, not guarantees, they are based entirely on trust and the threat of retaliation should they be broken. Thus, Security Assurances have been issued and changed over time, and are vital tools in the Nuclear Non-Proliferation Treaty (NPT). U.S. President Barack Obama modified the specific conditions of the US Negative Security Assurance on 6 April 2010 citing "the importance of nations meeting their NPT and nuclear non-proliferation obligations."[2]

China is so far the only nation to issue a positive security assurance in April 1995, and at the same time, it issued a negative security assurance. China stated that despite its willingness to use nuclear weapons, it "[should] not in any way be construed as endorsing the use of nuclear weapons."[3] The dichotomy of such a position has led for calls to make more use of protocols attached to NWFZ (nuclear-weapon-free zone) treaties, instead of generalized security assurances.[4]

  1. ^ "Negative Security Assurances (NSAs) and Positive Security Assurances (PSAs)". Nuclear Threat Initiative. Archived from the original on 2003-09-02.
  2. ^ "U.S. "Negative Security Assurances" At a Glance". Arms Control Association. Retrieved 7 June 2011.
  3. ^ China (1995-04-06), Letter dated 6 April 1995 from the Permanent Representative of China to the United Nations addressed to the Secretary-General., United Nations, S/1995/265, retrieved 2023-08-13
  4. ^ Spector and Ohlde, Leonard S. and Aubrie. "Negative Security Assurances: Revisiting the Nuclear-Weapon-Free Zone Option". Arms Control Today. Arms Control Association. Retrieved 7 June 2011.

and 30 Related for: Security assurance information

Request time (Page generated in 0.8643 seconds.)

Security assurance

Last Update:

A security assurance, in the context of nuclear warfare, is an expression of a political position by a nuclear-armed nation intended to placate other non-nuclear-armed...

Word Count : 427

Budapest Memorandum

Last Update:

The Budapest Memorandum on Security Assurances comprises three substantially identical political agreements signed at the OSCE conference in Budapest...

Word Count : 5248

Software security assurance

Last Update:

Software security assurance is a process that helps design and implement software that protects the data and resources contained in and controlled by that...

Word Count : 1395

Common Criteria

Last Update:

system users can specify their security functional and assurance requirements (SFRs and SARs, respectively) in a Security Target (ST), and may be taken...

Word Count : 3714

Software assurance

Last Update:

Software assurance (SwA) is a critical process in software development that ensures the reliability, safety, and security of software products. It involves...

Word Count : 3035

IEC 62443

Last Update:

integrators. These requirements are divided into 12 topics: Assurance, architecture, wireless, security engineering systems, configuration management, remote...

Word Count : 2172

Evaluation Assurance Level

Last Update:

Assurance Level (EAL1 through EAL7) of an IT product or system is a numerical grade assigned following the completion of a Common Criteria security evaluation...

Word Count : 1785

Security Target

Last Update:

security problem in terms of TOE description, threats, assumptions, security objectives, security functional requirements (SFRs), security assurance requirements...

Word Count : 663

Information assurance

Last Update:

superset of information security (i.e. umbrella term), and as the business outcome of information risk management. Information assurance (IA) is the process...

Word Count : 2481

Ukraine and weapons of mass destruction

Last Update:

and the United States signed a memorandum to provide Ukraine with security assurances in connection with its accession to the NPT as a non-nuclear weapon...

Word Count : 3250

List of states with nuclear weapons

Last Update:

the only NPT nuclear-weapon state to give an unqualified negative security assurance with its "no first use" policy. China acceded to the Nuclear Non-Proliferation...

Word Count : 8408

The Open Network

Last Update:

incorporates security measures through collaborations with various Security Assurance Providers (SAP). These providers conduct testing and quality assurance for...

Word Count : 2814

Protection Profile

Last Update:

specification of information assurance security requirements. A PP is a combination of threats, security objectives, assumptions, security functional requirements...

Word Count : 606

Security bug

Last Update:

before they are checked for being acceptable See software security assurance. Computer security Hacking: The Art of Exploitation IT risk Threat (computer)...

Word Count : 283

Failed state

Last Update:

include a government incapable of tax collection, law enforcement, security assurance, territorial control, political or civil office staffing, and infrastructure...

Word Count : 8333

Cloud Security Alliance

Last Update:

Cloud Security Alliance (CSA) is a not-for-profit organization with the mission to “promote the use of best practices for providing security assurance within...

Word Count : 1373

Financial Security Assurance

Last Update:

Financial Security Assurance (FSA) was an American financial guaranty (or monoline) insurance company. FSA was bought in 2000 for EUR€2.7 billion by the...

Word Count : 403

Information security

Last Update:

well-informed sense of assurance that information risks and controls are in balance." (Anderson, J., 2003) "Information security is the protection of information...

Word Count : 22122

Information Assurance Security Officer

Last Update:

An Information Assurance Security Officer (IASO) in the United States Army is primarily responsible for the security and integrity of the information...

Word Count : 43

Secure signature creation device

Last Update:

ability to specify security requirements via Protection Profiles (PPs) for security functional requirements (SFRs) and security assurance requirements (SARs)...

Word Count : 834

Security engineering

Last Update:

Security engineering is the process of incorporating security controls into an information system so that the controls become an integral part of the...

Word Count : 1185

Security Assurance by the Building Research Establishment

Last Update:

SABRE (Security Assurance by the Building Research Establishment) was launched in 2017 by the Building Research Establishment (BRE). Organisations such...

Word Count : 308

Fortify Software

Last Update:

security testing (SAST) and Dynamic application security testing products, as well as products and services that support Software Security Assurance....

Word Count : 632

Secure by design

Last Update:

obscurity Software Security Assurance Santos, Joanna C. S.; Tarrit, Katy; Mirakhorli, Mehdi (2017). "A Catalog of Security Architecture Weaknesses". 2017...

Word Count : 1072

National Information Assurance Glossary

Last Update:

Committee on National Security Systems Instruction No. 4009, National Information Assurance Glossary, published by the United States federal government...

Word Count : 131

Security controls

Last Update:

Supplier relationships security Legal and compliance Information security event management; and Information_security_assurance The previous version of...

Word Count : 1404

Guildhawk

Last Update:

historic catalogue of hit music from the dawn of the Jazz Age. To provide assurance and interoperability through the supply chain, Guildhawk was the first...

Word Count : 5292

Security Policy Framework

Last Update:

Protective Marking & Asset Control 3: Personnel Security 4: Information Security & Assurance 5: Physical Security 6: Counter-Terrorism 7: Business Continuity...

Word Count : 342

Information security standards

Last Update:

tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies...

Word Count : 2598

David Litchfield

Last Update:

is a British security expert and The Director of Information Security Assurance for Apple. Anne Saita, writing for Information Security magazine, called...

Word Count : 418

PDF Search Engine © AllGlobal.net