Rapidly Deployable Mobile Security Solutions for the Military: Navy Cyber Policies and Threats, Security, Mobile Devices, Bring Your Own Device (BYOD), Risk Management, Android Application Program

Nonfiction, History, Military, Weapons, Computers, Computer Hardware
Cover of the book Rapidly Deployable Mobile Security Solutions for the Military: Navy Cyber Policies and Threats, Security, Mobile Devices, Bring Your Own Device (BYOD), Risk Management, Android Application Program by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370717897
Publisher: Progressive Management Publication: October 9, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370717897
Publisher: Progressive Management
Publication: October 9, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. The Navy has seen a significant increase in the presence of mobile and smart devices on its units due to advancements in technology and younger sailors' desire to be connected at all times. These devices create security threats due to their easily concealable size and their host of connectivity and image related features. The insider threat (intentional or not) now includes the ability to take photos, record conversations, share data wirelessly, and communicate official use and classified information, all more easily than ever before.
Current enterprise solutions and associated policy does not address managing personal devices. In fact, management of personal devices is currently outside the Department of Defense (DOD) effort to control Personal Electronic Devices (PED) since the organization does not own the device and therefore has no way to mandate what must or must not be installed on them. The current path to a bring your own device (BYOD) policy is unclear. Security vulnerabilities with these devices have not been addressed in a uniform matter in policy or in practice. It is with these statements in mind that we address how to take the first steps in developing feasible management of personal devices on naval units and potentially throughout the DOD.
In this study, we provide a thorough evaluation of National Institute for Standards and Technology, Defense Information Systems Agency, and DOD publications to provide a starting point for adapting current policy and to guide the development of our application. We then examine the feasibility of implementable software application solutions to hardware features that pose a threat to security. Specific research addresses why each hardware feature on a mobile device is a security concern, how it is controlled inside the Android Studio API, and how we utilize these controls to lockdown and then unlock said hardware features through a simple proof of concept Android application. Finally, we provide examples of how future work can grow our application into a security-manager controlled program to secure devices and find a path toward making BYOD a reality.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. The Navy has seen a significant increase in the presence of mobile and smart devices on its units due to advancements in technology and younger sailors' desire to be connected at all times. These devices create security threats due to their easily concealable size and their host of connectivity and image related features. The insider threat (intentional or not) now includes the ability to take photos, record conversations, share data wirelessly, and communicate official use and classified information, all more easily than ever before.
Current enterprise solutions and associated policy does not address managing personal devices. In fact, management of personal devices is currently outside the Department of Defense (DOD) effort to control Personal Electronic Devices (PED) since the organization does not own the device and therefore has no way to mandate what must or must not be installed on them. The current path to a bring your own device (BYOD) policy is unclear. Security vulnerabilities with these devices have not been addressed in a uniform matter in policy or in practice. It is with these statements in mind that we address how to take the first steps in developing feasible management of personal devices on naval units and potentially throughout the DOD.
In this study, we provide a thorough evaluation of National Institute for Standards and Technology, Defense Information Systems Agency, and DOD publications to provide a starting point for adapting current policy and to guide the development of our application. We then examine the feasibility of implementable software application solutions to hardware features that pose a threat to security. Specific research addresses why each hardware feature on a mobile device is a security concern, how it is controlled inside the Android Studio API, and how we utilize these controls to lockdown and then unlock said hardware features through a simple proof of concept Android application. Finally, we provide examples of how future work can grow our application into a security-manager controlled program to secure devices and find a path toward making BYOD a reality.

More books from Progressive Management

Cover of the book 21st Century U.S. Military Documents: Air Force Aviation Management Instruction - Guidance for Administering Aircrew Flight Management Programs for Flying Unit Commanders and Aircrew Personnel by Progressive Management
Cover of the book Marine Communications in Desert Shield and Desert Storm: U.S. Marines in the Persian Gulf 1990-1991, Gulf War, Kuwait, Saudi Arabia, CentCom, Air Control, Ground Campaign, Schwarzkopf by Progressive Management
Cover of the book Inside the International Space Station (ISS): NASA International Space Station Familiarization Astronaut Training Manual - Comprehensive Review of ISS Systems by Progressive Management
Cover of the book History of the Joint Chiefs of Staff: The War in Vietnam 1960-1968, Part 2 - Johnson and McNamara, Escalation in South Vietnam, Tonkin Gulf, Saigon, Rolling Thunder by Progressive Management
Cover of the book The End of the Beginning: On the Application of Aerospace Power in an Age of Fractured Sovereignty, Trends 2020, Demography, Technology, Military, Social, Operations with Blurred Boundaries by Progressive Management
Cover of the book A Plan for the Future: 10-Year Strategy for the Air Traffic Control Workforce 2011-2020, TRACON, Terminal and En Route Services, Training and Hiring Process, Staffing Requirements by Progressive Management
Cover of the book Iraqi Perspectives Project: A View of Operation Iraqi Freedom from Saddam's Senior Leadership - Hussein's Distorted Worldview, Desert Storm, Regime Prepares for War, Baghdad Bob, Final Days by Progressive Management
Cover of the book International Atomic Energy Agency's Decision to Find Iran in Non-Compliance, 2002-2006 (IAEA) - Nuclear Bargaining Leads to Referral to the UN Security Council after New Bomb Suspicions Emerge by Progressive Management
Cover of the book A History of Marine Fighter Attack Squadron 115: World War II Pacific Action, Philippine Combat, China, Hawaiian, Korea, Japan - U.S. Shuttle, Vietnam, Thailand Deployment, Unusual Air-Ground Tactics by Progressive Management
Cover of the book 2015 Complete Guide to Operation Inherent Resolve: America's War Against the Islamic State, ISIS, ISIL Terrorists in Iraq and Syria, Leader al-Baghdadi, Levant, al-Qaeda in Syria by Progressive Management
Cover of the book Enabling Others to Win in a Complex World: Maximizing Security Force Assistance Potential in the Regionally Aligned Brigade Combat Team - Iraqi Freedom, Relevance to Contemporary Environment by Progressive Management
Cover of the book 20th Century Spy in the Sky Satellites: Secrets of the National Reconnaissance Office (NRO) Volume 5 - NRO Leaders, Founders, Pioneers, and the Robert Perry History Volume IV by Progressive Management
Cover of the book Realizing the Dream of Flight: Biographical Essays in Honor of the Centennial of Flight, 1903-2003 - Wernher von Braun, Robert Gilruth, Willy Ley, Hugh Dryden, Donald Douglas (NASA SP-2005-4112) by Progressive Management
Cover of the book American Nuclear Attack Doctrine: Official Guidelines for Nuclear Operations, Command, Control, and Communications for a Nuclear War, plus Vintage Fallout Protection Civil Defense Program Guide by Progressive Management
Cover of the book U.S. Marines in Vietnam: The Advisory and Combat Assistance Era 1954-1964 - War in Southeast Asia, Communist Insurgency, MACV, SHUFLY, Soc Trang, Mekong Delta, VNMC, Monsoons, Prelude to Escalation by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy