Rapidly Deployable Mobile Security Solutions for the Military: Navy Cyber Policies and Threats, Security, Mobile Devices, Bring Your Own Device (BYOD), Risk Management, Android Application Program

Nonfiction, History, Military, Weapons, Computers, Computer Hardware
Cover of the book Rapidly Deployable Mobile Security Solutions for the Military: Navy Cyber Policies and Threats, Security, Mobile Devices, Bring Your Own Device (BYOD), Risk Management, Android Application Program by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370717897
Publisher: Progressive Management Publication: October 9, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370717897
Publisher: Progressive Management
Publication: October 9, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. The Navy has seen a significant increase in the presence of mobile and smart devices on its units due to advancements in technology and younger sailors' desire to be connected at all times. These devices create security threats due to their easily concealable size and their host of connectivity and image related features. The insider threat (intentional or not) now includes the ability to take photos, record conversations, share data wirelessly, and communicate official use and classified information, all more easily than ever before.
Current enterprise solutions and associated policy does not address managing personal devices. In fact, management of personal devices is currently outside the Department of Defense (DOD) effort to control Personal Electronic Devices (PED) since the organization does not own the device and therefore has no way to mandate what must or must not be installed on them. The current path to a bring your own device (BYOD) policy is unclear. Security vulnerabilities with these devices have not been addressed in a uniform matter in policy or in practice. It is with these statements in mind that we address how to take the first steps in developing feasible management of personal devices on naval units and potentially throughout the DOD.
In this study, we provide a thorough evaluation of National Institute for Standards and Technology, Defense Information Systems Agency, and DOD publications to provide a starting point for adapting current policy and to guide the development of our application. We then examine the feasibility of implementable software application solutions to hardware features that pose a threat to security. Specific research addresses why each hardware feature on a mobile device is a security concern, how it is controlled inside the Android Studio API, and how we utilize these controls to lockdown and then unlock said hardware features through a simple proof of concept Android application. Finally, we provide examples of how future work can grow our application into a security-manager controlled program to secure devices and find a path toward making BYOD a reality.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. The Navy has seen a significant increase in the presence of mobile and smart devices on its units due to advancements in technology and younger sailors' desire to be connected at all times. These devices create security threats due to their easily concealable size and their host of connectivity and image related features. The insider threat (intentional or not) now includes the ability to take photos, record conversations, share data wirelessly, and communicate official use and classified information, all more easily than ever before.
Current enterprise solutions and associated policy does not address managing personal devices. In fact, management of personal devices is currently outside the Department of Defense (DOD) effort to control Personal Electronic Devices (PED) since the organization does not own the device and therefore has no way to mandate what must or must not be installed on them. The current path to a bring your own device (BYOD) policy is unclear. Security vulnerabilities with these devices have not been addressed in a uniform matter in policy or in practice. It is with these statements in mind that we address how to take the first steps in developing feasible management of personal devices on naval units and potentially throughout the DOD.
In this study, we provide a thorough evaluation of National Institute for Standards and Technology, Defense Information Systems Agency, and DOD publications to provide a starting point for adapting current policy and to guide the development of our application. We then examine the feasibility of implementable software application solutions to hardware features that pose a threat to security. Specific research addresses why each hardware feature on a mobile device is a security concern, how it is controlled inside the Android Studio API, and how we utilize these controls to lockdown and then unlock said hardware features through a simple proof of concept Android application. Finally, we provide examples of how future work can grow our application into a security-manager controlled program to secure devices and find a path toward making BYOD a reality.

More books from Progressive Management

Cover of the book Civil: Military Relations in the French Fourth Republic during First Indochina War – Collapse of Third Republic in World War II, Southeast Asia and Vietnam, Pacification of Viet Minh Nationalists by Progressive Management
Cover of the book 21st Century FEMA Study Course: Livestock in Disasters (IS-111) - For Farmers, Extension Agents - Cattle, Pigs, Poultry, Floods, Storms by Progressive Management
Cover of the book 2011 Official Dictionary of Nuclear, Radiation, and Radiological Terms and Acronyms: Nuclear Power Plants, Atomic Weapons, Military Stockpile, Radiation Medicine by Progressive Management
Cover of the book Space Shuttle NASA Mission Reports: 1999 Missions, STS-96, STS-93, STS-103 by Progressive Management
Cover of the book A History of Sea-Air Aviation: Wings Over The Ocean - Chronicling the History of Sea-Air Flight Operations, Early Aviation History, World War II Naval Aviation, Chanute, Curtiss, Lindbergh by Progressive Management
Cover of the book The Mineless Battlespace: Shaping the Future Battlefield without Conventional Landmines - History and Evolution of Landmines, Support for the Ban, Humanitarian Crisis, Doctrines for Alternatives by Progressive Management
Cover of the book 2014 U.S. Intelligence Community Worldwide Threat Assessment: Clapper Testimony: Cyber Threats, Iran, Nuclear Weapons, Terrorism, al-Qaida, Jihad, WMD, North Korea, Syria, Afghanistan by Progressive Management
Cover of the book Reclamation: Managing Water in the West - The Bureau of Reclamation: From Developing to Managing Water, 1945-2000, Volume 2 - Part 2: Hells Canyon, Columbia, Utah, Arizona, Fish versus Dams by Progressive Management
Cover of the book The Story of Davis-Monthan Air Force Base 1940: 1976, Strategic Air Command, B-29, B-50, U-2, A-10, Lucky Lady II, Tactical Air Command, F-4C Fighter, Tucson Arizona Community, Aircraft Storage by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: U.S. Marine Corps (USMC) Guide To Cold Weather Operations MCRP 3-35.1A (Value-Added Professional Format Series) by Progressive Management
Cover of the book Dangerous Illicit Drug Alerts: Synthetic Cathinones (Bath Salts), Mephedrone, Synthetic Cannabinoids, Purple Drank, Synthetic Hallucinogen 2C-E, Oxymorphone Abuse, Opium Tea, Salvia Divinorum by Progressive Management
Cover of the book 2017 U.S. Navy Illustrated Encyclopedia of Weapons, Ships, and Equipment: Updated Program Guide - Aircraft, Jets, Carriers, Submarines, Missiles, Electronics, Surface Combatants, Science, Technology by Progressive Management
Cover of the book The New World: A History of the United States Atomic Energy Commission (AEC) - Volume 1, 1939 to 1946 - The Race for the Atomic Bomb, Uranium 235, Plutonium, Controlling the Bomb after World War II by Progressive Management
Cover of the book Adaptation to Change: U.S. Army Cavalry Doctrine and Mechanization, 1938-1945 - World War II Armored Force, Corps Reconnaissance by Progressive Management
Cover of the book The United States Humanitarian Demining Program (HDP): Civil-military Relations – Critical Analysis of Landmine Removal in Afghanistan and Kosovo, Through the Lens of People, Government, and Military by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy