Rapidly Deployable Mobile Security Solutions for the Military: Navy Cyber Policies and Threats, Security, Mobile Devices, Bring Your Own Device (BYOD), Risk Management, Android Application Program

Nonfiction, History, Military, Weapons, Computers, Computer Hardware
Cover of the book Rapidly Deployable Mobile Security Solutions for the Military: Navy Cyber Policies and Threats, Security, Mobile Devices, Bring Your Own Device (BYOD), Risk Management, Android Application Program by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370717897
Publisher: Progressive Management Publication: October 9, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370717897
Publisher: Progressive Management
Publication: October 9, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. The Navy has seen a significant increase in the presence of mobile and smart devices on its units due to advancements in technology and younger sailors' desire to be connected at all times. These devices create security threats due to their easily concealable size and their host of connectivity and image related features. The insider threat (intentional or not) now includes the ability to take photos, record conversations, share data wirelessly, and communicate official use and classified information, all more easily than ever before.
Current enterprise solutions and associated policy does not address managing personal devices. In fact, management of personal devices is currently outside the Department of Defense (DOD) effort to control Personal Electronic Devices (PED) since the organization does not own the device and therefore has no way to mandate what must or must not be installed on them. The current path to a bring your own device (BYOD) policy is unclear. Security vulnerabilities with these devices have not been addressed in a uniform matter in policy or in practice. It is with these statements in mind that we address how to take the first steps in developing feasible management of personal devices on naval units and potentially throughout the DOD.
In this study, we provide a thorough evaluation of National Institute for Standards and Technology, Defense Information Systems Agency, and DOD publications to provide a starting point for adapting current policy and to guide the development of our application. We then examine the feasibility of implementable software application solutions to hardware features that pose a threat to security. Specific research addresses why each hardware feature on a mobile device is a security concern, how it is controlled inside the Android Studio API, and how we utilize these controls to lockdown and then unlock said hardware features through a simple proof of concept Android application. Finally, we provide examples of how future work can grow our application into a security-manager controlled program to secure devices and find a path toward making BYOD a reality.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. The Navy has seen a significant increase in the presence of mobile and smart devices on its units due to advancements in technology and younger sailors' desire to be connected at all times. These devices create security threats due to their easily concealable size and their host of connectivity and image related features. The insider threat (intentional or not) now includes the ability to take photos, record conversations, share data wirelessly, and communicate official use and classified information, all more easily than ever before.
Current enterprise solutions and associated policy does not address managing personal devices. In fact, management of personal devices is currently outside the Department of Defense (DOD) effort to control Personal Electronic Devices (PED) since the organization does not own the device and therefore has no way to mandate what must or must not be installed on them. The current path to a bring your own device (BYOD) policy is unclear. Security vulnerabilities with these devices have not been addressed in a uniform matter in policy or in practice. It is with these statements in mind that we address how to take the first steps in developing feasible management of personal devices on naval units and potentially throughout the DOD.
In this study, we provide a thorough evaluation of National Institute for Standards and Technology, Defense Information Systems Agency, and DOD publications to provide a starting point for adapting current policy and to guide the development of our application. We then examine the feasibility of implementable software application solutions to hardware features that pose a threat to security. Specific research addresses why each hardware feature on a mobile device is a security concern, how it is controlled inside the Android Studio API, and how we utilize these controls to lockdown and then unlock said hardware features through a simple proof of concept Android application. Finally, we provide examples of how future work can grow our application into a security-manager controlled program to secure devices and find a path toward making BYOD a reality.

More books from Progressive Management

Cover of the book Leveraging Affective Learning for Developing Future Airmen: Cognitive, Affective, and Psychomotor Domains, Instructional Design Process, Online and Technology Learning Environments by Progressive Management
Cover of the book 2014 Complete Guide to the TransCanada Keystone XL Pipeline: State Department Final Supplemental EIS, Risks to the Environment and Water Resources, Congressional Report by Progressive Management
Cover of the book The Report of the Presidential Commission on the Space Shuttle Challenger Accident: The Tragedy of Mission 51-L in 1986 - Volume Three, Appendix N, Photo and TV Support Team Report by Progressive Management
Cover of the book National Defense Intelligence College Paper: Managing the Private Spies: The Use of Commercial Augmentation for Intelligence Operations - Pinkerton to Abu Ghraib by Progressive Management
Cover of the book Fighting the Big War with the Small Hammer: Operational Planning for the Medium Force – Case Studies and Tempo Analysis of World War II German Army Battle of Mortain, Defeat at Argentan-Falaise Gap by Progressive Management
Cover of the book Failed State 2030: Nigeria - A Case Study, Tribal Conflict, Civil War, Islam and Religious Strife, Terrorism, Crime, Niger Delta, OPEC, Military Coups, Goodluck Jonathan by Progressive Management
Cover of the book Nanoscience and Nanotechnology: NIST Center for Nanoscale Science and Technology (CNST) NanoFab Cleanroom Safety Manual by Progressive Management
Cover of the book Airhead Operations: Where AMC Delivers: The Linchpin of Rapid Force Projection - Mogadishu, Somalia, Operation Restore Hope, Air Mobility by Progressive Management
Cover of the book Nanoscience and Nanotechnology: NIST Center for Nanoscale Science and Technology (CNST) Reports - Graphene, Single-Electron Devices (SEDs), Nanowire, Photovoltaic by Progressive Management
Cover of the book Fires Red Book 2011: A Joint Publication for U.S. Artillery Professionals, Army Air Defense Artillery Units, Lessons Learned During Ten Years of Persistent War by Progressive Management
Cover of the book Demographics of the American Military: Profile of the Military Community 2012 - Total Force, Active Duty Members, Reserve and Guard Members, Families, Pay, Installation Populations by Progressive Management
Cover of the book The Russian Way of War: Post Soviet Adaptations in the Russian Military and Why the Russian Military Failed in Chechnya - Putin, Grozny, Chechen and Georgian War, South Ossetia, Abkhazia by Progressive Management
Cover of the book Search and Rescue in Southeast Asia: USAF in Southeast Asia - SAR from World War II to the 1970s, Vietnam Escalation, Son Tay to Cease-fire, Mayaguez, Helicopter Rescues Plucking Fallen Aircrews by Progressive Management
Cover of the book A-10 Thunderbolt II (Warthog) Systems Engineering Case Study - Close Air Support (CAS) Aircraft by Progressive Management
Cover of the book Neil Armstrong: The Incredible Life and Career of a True Hero, From Test Pilot to First Man on the Moon on Apollo 11 - An Expansive Compilation of Authoritative NASA History Documents and Selections by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy