Rapidly Deployable Mobile Security Solutions for the Military: Navy Cyber Policies and Threats, Security, Mobile Devices, Bring Your Own Device (BYOD), Risk Management, Android Application Program

Nonfiction, History, Military, Weapons, Computers, Computer Hardware
Cover of the book Rapidly Deployable Mobile Security Solutions for the Military: Navy Cyber Policies and Threats, Security, Mobile Devices, Bring Your Own Device (BYOD), Risk Management, Android Application Program by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370717897
Publisher: Progressive Management Publication: October 9, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370717897
Publisher: Progressive Management
Publication: October 9, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. The Navy has seen a significant increase in the presence of mobile and smart devices on its units due to advancements in technology and younger sailors' desire to be connected at all times. These devices create security threats due to their easily concealable size and their host of connectivity and image related features. The insider threat (intentional or not) now includes the ability to take photos, record conversations, share data wirelessly, and communicate official use and classified information, all more easily than ever before.
Current enterprise solutions and associated policy does not address managing personal devices. In fact, management of personal devices is currently outside the Department of Defense (DOD) effort to control Personal Electronic Devices (PED) since the organization does not own the device and therefore has no way to mandate what must or must not be installed on them. The current path to a bring your own device (BYOD) policy is unclear. Security vulnerabilities with these devices have not been addressed in a uniform matter in policy or in practice. It is with these statements in mind that we address how to take the first steps in developing feasible management of personal devices on naval units and potentially throughout the DOD.
In this study, we provide a thorough evaluation of National Institute for Standards and Technology, Defense Information Systems Agency, and DOD publications to provide a starting point for adapting current policy and to guide the development of our application. We then examine the feasibility of implementable software application solutions to hardware features that pose a threat to security. Specific research addresses why each hardware feature on a mobile device is a security concern, how it is controlled inside the Android Studio API, and how we utilize these controls to lockdown and then unlock said hardware features through a simple proof of concept Android application. Finally, we provide examples of how future work can grow our application into a security-manager controlled program to secure devices and find a path toward making BYOD a reality.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. The Navy has seen a significant increase in the presence of mobile and smart devices on its units due to advancements in technology and younger sailors' desire to be connected at all times. These devices create security threats due to their easily concealable size and their host of connectivity and image related features. The insider threat (intentional or not) now includes the ability to take photos, record conversations, share data wirelessly, and communicate official use and classified information, all more easily than ever before.
Current enterprise solutions and associated policy does not address managing personal devices. In fact, management of personal devices is currently outside the Department of Defense (DOD) effort to control Personal Electronic Devices (PED) since the organization does not own the device and therefore has no way to mandate what must or must not be installed on them. The current path to a bring your own device (BYOD) policy is unclear. Security vulnerabilities with these devices have not been addressed in a uniform matter in policy or in practice. It is with these statements in mind that we address how to take the first steps in developing feasible management of personal devices on naval units and potentially throughout the DOD.
In this study, we provide a thorough evaluation of National Institute for Standards and Technology, Defense Information Systems Agency, and DOD publications to provide a starting point for adapting current policy and to guide the development of our application. We then examine the feasibility of implementable software application solutions to hardware features that pose a threat to security. Specific research addresses why each hardware feature on a mobile device is a security concern, how it is controlled inside the Android Studio API, and how we utilize these controls to lockdown and then unlock said hardware features through a simple proof of concept Android application. Finally, we provide examples of how future work can grow our application into a security-manager controlled program to secure devices and find a path toward making BYOD a reality.

More books from Progressive Management

Cover of the book El Salvador: Limited Intervention Equals Limited Returns – History of President Reagan’s Cold War Policy to Restrain Soviet Communist Expansion in Central America in Low-Intensity Counterinsurgency by Progressive Management
Cover of the book National Emergency Medical Services Education Standards: Emergency Medical Technician Instructional Guidelines - Airway Management, Shock and Resuscitation, Trauma, EMS Operations by Progressive Management
Cover of the book Air Force Doctrine Document 3-59: Weather Operations - Principles, Air Force Combat Climatology Center (AFCCC), Space Weather Branch, History of Desert Storm and Operation Eagle Claw by Progressive Management
Cover of the book Yemen: Comparative Insurgency and Counterinsurgency - al-Qaeda in the Arabian Peninsula (AQAP), Huthi Movement, Hirak, Tribal Elements, Sanaa, Could Yemen Become the Next Somalia Safe Haven for Terror by Progressive Management
Cover of the book An Aversion to Risk: A Warning From the Past: Comparison of 1862 American Civil War Peninsula Campaign with General McClellan to the 2003 Iraq War Failures, Afghanistan, Goldwater-Nichols, Petraeus by Progressive Management
Cover of the book FAA National Aviation Research Plan, Portfolio of Goals, Destination 2025, Flight Plan Program: National Airspace System, NextGen, Air Traffic, Human Protection, Crash Safety, Aviation Weather by Progressive Management
Cover of the book 2011 Al Qaeda and Affiliates: Historical Perspective, Global Presence, and Implications for U.S. Policy - Congressional Research Service Report by Progressive Management
Cover of the book To See the Unseen: A History of Planetary Radar Astronomy - A Comprehensive History of Radar Observations of Venus, Mars, Comets, Asteroids, the Magellan Mission, Arecibo Observatory (NASA SP-4218) by Progressive Management
Cover of the book National Defense Intelligence College Paper: Educing Information - Interrogation: Science and Art - Terrorism and Torture, KUBARK, Techniques and Training by Progressive Management
Cover of the book Complete Guide to the American Civil War Battle of Gettysburg: Troops, Biographical Sketches of Leaders, Weaponry, Small Arms, 150th Anniversary, Strategic Setting, Operational Art, Legacy by Progressive Management
Cover of the book U.S. Naval Aviation in the Pacific: World War II - Pearl Harbor, Midway, Guadalcanal, Bougainville, Tarawa, Toyko, Tactical Effectiveness, Weapons by Progressive Management
Cover of the book Battle-Wise: Seeking Time-Information Superiority in Networked Warfare - Defeating Adversaries, Cognitive Demands, Integrating Intuition and Reasoning, Battle Wisdom from Firepower to Brainpower by Progressive Management
Cover of the book Adapting Unconventional Warfare Doctrine to Cyberspace Operations: Examination of Hacktivist Based Insurgencies - Cyber Warfare Roles of Russia, China, Analysis of 2014 Hong Kong Umbrella Revolution by Progressive Management
Cover of the book Drug Trafficking and Police Corruption: A Comparison of Colombia and Mexico - Pablo Escobar, Los Pepes, Medellin, Drug Cartels, Colombia's Success and Mexico's Failure at Reforming the Police by Progressive Management
Cover of the book On Alert: An Operational History of the United States Air Force Intercontinental Ballistic Missile (ICBM) Program, 1945-2011 - Atlas, Titan, Minuteman, Peacekeeper MX, Minuteman III, Nuclear Warhead by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy