Rapidly Deployable Mobile Security Solutions for the Military: Navy Cyber Policies and Threats, Security, Mobile Devices, Bring Your Own Device (BYOD), Risk Management, Android Application Program

Nonfiction, History, Military, Weapons, Computers, Computer Hardware
Cover of the book Rapidly Deployable Mobile Security Solutions for the Military: Navy Cyber Policies and Threats, Security, Mobile Devices, Bring Your Own Device (BYOD), Risk Management, Android Application Program by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370717897
Publisher: Progressive Management Publication: October 9, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370717897
Publisher: Progressive Management
Publication: October 9, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. The Navy has seen a significant increase in the presence of mobile and smart devices on its units due to advancements in technology and younger sailors' desire to be connected at all times. These devices create security threats due to their easily concealable size and their host of connectivity and image related features. The insider threat (intentional or not) now includes the ability to take photos, record conversations, share data wirelessly, and communicate official use and classified information, all more easily than ever before.
Current enterprise solutions and associated policy does not address managing personal devices. In fact, management of personal devices is currently outside the Department of Defense (DOD) effort to control Personal Electronic Devices (PED) since the organization does not own the device and therefore has no way to mandate what must or must not be installed on them. The current path to a bring your own device (BYOD) policy is unclear. Security vulnerabilities with these devices have not been addressed in a uniform matter in policy or in practice. It is with these statements in mind that we address how to take the first steps in developing feasible management of personal devices on naval units and potentially throughout the DOD.
In this study, we provide a thorough evaluation of National Institute for Standards and Technology, Defense Information Systems Agency, and DOD publications to provide a starting point for adapting current policy and to guide the development of our application. We then examine the feasibility of implementable software application solutions to hardware features that pose a threat to security. Specific research addresses why each hardware feature on a mobile device is a security concern, how it is controlled inside the Android Studio API, and how we utilize these controls to lockdown and then unlock said hardware features through a simple proof of concept Android application. Finally, we provide examples of how future work can grow our application into a security-manager controlled program to secure devices and find a path toward making BYOD a reality.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. The Navy has seen a significant increase in the presence of mobile and smart devices on its units due to advancements in technology and younger sailors' desire to be connected at all times. These devices create security threats due to their easily concealable size and their host of connectivity and image related features. The insider threat (intentional or not) now includes the ability to take photos, record conversations, share data wirelessly, and communicate official use and classified information, all more easily than ever before.
Current enterprise solutions and associated policy does not address managing personal devices. In fact, management of personal devices is currently outside the Department of Defense (DOD) effort to control Personal Electronic Devices (PED) since the organization does not own the device and therefore has no way to mandate what must or must not be installed on them. The current path to a bring your own device (BYOD) policy is unclear. Security vulnerabilities with these devices have not been addressed in a uniform matter in policy or in practice. It is with these statements in mind that we address how to take the first steps in developing feasible management of personal devices on naval units and potentially throughout the DOD.
In this study, we provide a thorough evaluation of National Institute for Standards and Technology, Defense Information Systems Agency, and DOD publications to provide a starting point for adapting current policy and to guide the development of our application. We then examine the feasibility of implementable software application solutions to hardware features that pose a threat to security. Specific research addresses why each hardware feature on a mobile device is a security concern, how it is controlled inside the Android Studio API, and how we utilize these controls to lockdown and then unlock said hardware features through a simple proof of concept Android application. Finally, we provide examples of how future work can grow our application into a security-manager controlled program to secure devices and find a path toward making BYOD a reality.

More books from Progressive Management

Cover of the book Encyclopedia of NASA Lessons Learned (Part 1): Thousands of Aerospace Technology Engineering Reports, Problems, Accidents, Mishaps, Ideas and Solutions - Space Shuttle, Spacecraft, Rockets, Aircraft by Progressive Management
Cover of the book The War Against Trucks: Aerial Interdiction in Southern Laos, 1968-1972 - Vietnam War Era, Jason Summer Study, Commando Hunt Campaigns, Electronic Surveillance Network by Progressive Management
Cover of the book NASA International Space Station (ISS) Oral History Project: Interviews with Astronauts, Managers - Cabana, Chilton, Suffredini, Voss, Whitson, Williams, Columbia Shuttle Accident, Chilean Mine Rescue by Progressive Management
Cover of the book U.S. Army Irregular Opposing Forces (OPFOR): Insurgents, Guerrillas, Criminals, Noncombatants, Terrorism, Functional Tactics, Techniques, Procedures, Hybrid Threat for Training by Progressive Management
Cover of the book Air Force Doctrine Document 3-70: Strategic Attack - Effects-Based Approach, Historic Attacks, Situation Development, Center of Gravity Analysis, Desert Storm, Milosevic, Command and Control by Progressive Management
Cover of the book The Origins of the "Golden Hour" of Medical Care and its Applicability to Combat Medicine: History of Casualty Care from World War I through Vietnam, Injury and Death in Combat, Evacuation Doctrine by Progressive Management
Cover of the book U.S. Army Medical Correspondence Course: Red Meats - Terminology, Beef Introduction, Inspection of Carcass, Cuts, Roasts, Steaks, Fat, Pork and Loin Roasts, Cured, Smoked, Sausage by Progressive Management
Cover of the book Indonesia in Perspective: Orientation Guide and Javanese, Bahasa Cultural Orientation: Geography, History, Economy, Security, Jakarta, Sukarno, Bali, Nusa Tenggara, Kalimantan, Sulawesi, Papua by Progressive Management
Cover of the book Air Power and Warfare: Proceedings of 8th Military History Symposium at U.S. Air Force Academy - Early British, European, American, Soviet, Japanese Experience, World War II, Apollo Astronaut Collins by Progressive Management
Cover of the book Loss of Signal: Aeromedical Lessons Learned from the STS-107 Columbia Space Shuttle Mishap - Aerospace Medicine, Reentry and Spacecraft Breakup, Search and Recovery, Forensic Sciences by Progressive Management
Cover of the book Aviation in the U.S. Army, 1919-1939: The Flying Circus, Planes versus Ships, the Air Corps, Airmail, Building an Air Force, Crew Training, Operations, Coastal Defense, Acrobatics, Civil Affairs by Progressive Management
Cover of the book Aeronautics and Space Report of the President Fiscal Year 2016 Activities: Comprehensive Survey of Spacecraft, Satellites, Airplanes, and Research Activities of Eleven U.S. Federal Agencies by Progressive Management
Cover of the book Apollo and America's Moon Landing Program: Command Module (CSM) Reference by Progressive Management
Cover of the book Small Wind Electric Systems: Consumers Guide with Practical Information for Homeowners, Farmer, Ranchers, Small Businesses by Progressive Management
Cover of the book 2014 Quadrennial Defense Review: Department of Defense Budget Priorities Under Sequestration Cuts, Defense Strategy, Rebalancing the Joint Force by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy