Rapidly Deployable Mobile Security Solutions for the Military: Navy Cyber Policies and Threats, Security, Mobile Devices, Bring Your Own Device (BYOD), Risk Management, Android Application Program

Nonfiction, History, Military, Weapons, Computers, Computer Hardware
Cover of the book Rapidly Deployable Mobile Security Solutions for the Military: Navy Cyber Policies and Threats, Security, Mobile Devices, Bring Your Own Device (BYOD), Risk Management, Android Application Program by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370717897
Publisher: Progressive Management Publication: October 9, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370717897
Publisher: Progressive Management
Publication: October 9, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. The Navy has seen a significant increase in the presence of mobile and smart devices on its units due to advancements in technology and younger sailors' desire to be connected at all times. These devices create security threats due to their easily concealable size and their host of connectivity and image related features. The insider threat (intentional or not) now includes the ability to take photos, record conversations, share data wirelessly, and communicate official use and classified information, all more easily than ever before.
Current enterprise solutions and associated policy does not address managing personal devices. In fact, management of personal devices is currently outside the Department of Defense (DOD) effort to control Personal Electronic Devices (PED) since the organization does not own the device and therefore has no way to mandate what must or must not be installed on them. The current path to a bring your own device (BYOD) policy is unclear. Security vulnerabilities with these devices have not been addressed in a uniform matter in policy or in practice. It is with these statements in mind that we address how to take the first steps in developing feasible management of personal devices on naval units and potentially throughout the DOD.
In this study, we provide a thorough evaluation of National Institute for Standards and Technology, Defense Information Systems Agency, and DOD publications to provide a starting point for adapting current policy and to guide the development of our application. We then examine the feasibility of implementable software application solutions to hardware features that pose a threat to security. Specific research addresses why each hardware feature on a mobile device is a security concern, how it is controlled inside the Android Studio API, and how we utilize these controls to lockdown and then unlock said hardware features through a simple proof of concept Android application. Finally, we provide examples of how future work can grow our application into a security-manager controlled program to secure devices and find a path toward making BYOD a reality.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. The Navy has seen a significant increase in the presence of mobile and smart devices on its units due to advancements in technology and younger sailors' desire to be connected at all times. These devices create security threats due to their easily concealable size and their host of connectivity and image related features. The insider threat (intentional or not) now includes the ability to take photos, record conversations, share data wirelessly, and communicate official use and classified information, all more easily than ever before.
Current enterprise solutions and associated policy does not address managing personal devices. In fact, management of personal devices is currently outside the Department of Defense (DOD) effort to control Personal Electronic Devices (PED) since the organization does not own the device and therefore has no way to mandate what must or must not be installed on them. The current path to a bring your own device (BYOD) policy is unclear. Security vulnerabilities with these devices have not been addressed in a uniform matter in policy or in practice. It is with these statements in mind that we address how to take the first steps in developing feasible management of personal devices on naval units and potentially throughout the DOD.
In this study, we provide a thorough evaluation of National Institute for Standards and Technology, Defense Information Systems Agency, and DOD publications to provide a starting point for adapting current policy and to guide the development of our application. We then examine the feasibility of implementable software application solutions to hardware features that pose a threat to security. Specific research addresses why each hardware feature on a mobile device is a security concern, how it is controlled inside the Android Studio API, and how we utilize these controls to lockdown and then unlock said hardware features through a simple proof of concept Android application. Finally, we provide examples of how future work can grow our application into a security-manager controlled program to secure devices and find a path toward making BYOD a reality.

More books from Progressive Management

Cover of the book Cultural Intelligence for the Commander: A Necessary Ingredient - The Japanese in World War II, Lessons from Operation Iraqi Freedom, Emerging Threat of Terrorism, Need for Actionable Intelligence by Progressive Management
Cover of the book 21st Century Cryoglobulinemia Sourcebook: Clinical Data for Patients, Families, and Physicians - Purpura, Raynaud's Phenomenon, Plasmapheresis, Vasculitis, Autoimmune Disorders by Progressive Management
Cover of the book Britain's Nuclear Deterrent Force and the U.S. - U.K. Special Relationship: History of Atomic Weapons with Manhattan Project, Trident Submarine-launched Ballistic Missiles (SLBM) Replacement Decision by Progressive Management
Cover of the book Gaming The Interwar: How Naval War College Wargames Tilted the Playing Field for the U.S. Navy During World War II - Molding Mahan, War Plan Orange, Fleet Problems, Feedback, Solomons, Peleliu, Samar by Progressive Management
Cover of the book United Arab Emirates (UAE) in Perspective - Orientation Guide and Emirati Cultural Orientation: Geography, History, Economy, Security, Customs, Rural and Urban Life, Abu Dhabi, Dubai, Al-Ain, Islam by Progressive Management
Cover of the book Boko Haram's Strategy Deconstructed: A Case Study Comparison Between Boko Haram and the Algerian National Liberation Front - Salafist Islamic Insurgency Strategy in Nigeria and West Africa by Progressive Management
Cover of the book Crony Attack: Strategic Attack's Silver Bullet? Targeting Key Elite Supporters of an Enemy Leader - Operation Allied Force, Slobodan Milosevic, Yugoslavia, RICO, Kleptocracies, Coercive Air Strategy by Progressive Management
Cover of the book Three Mile Island (TMI) Nuclear Power Plant Accident: NRC Official Lessons Learned Task Force Final Report (NUREG-0585) - 1979 Partial Meltdown with Radiation Releases by Progressive Management
Cover of the book 21st Century Understanding Cancer Toolkit: Coping with Advanced Cancer - Metastatic Cancer, Caregiver Support, Palliative Care and Hospice, Advance Directives, End-of-Life Care, Pain Control, Grief by Progressive Management
Cover of the book Cold War Infrastructure for Air Defense: The Fighter and Command Missions - SAC, ADC, ANG, TAC, SAGE, Alert Hangars, Simulator, Aircraft Shelters, Air Force Bases from Barksdale to Whiteman by Progressive Management
Cover of the book 21st Century FEMA Study Course: Protecting Your Home or Small Business From Disaster (IS-394.a) - Natural Disasters, Water and Wind Damage, Wildfires, Earthquake Damage, Success Stories by Progressive Management
Cover of the book Atomic Shield: A History of the United States Atomic Energy Commission (AEC) - Volume II, 1947-1952 - Terrible Responsibility, Call to Arms, Nuclear Arsenal, Quest for the Super (Hydrogen Bomb) by Progressive Management
Cover of the book The Partnership: A History of the Apollo-Soyuz Test Project (NASA SP-4209) - Comprehensive Official History of NASA's Work with the Soviet Union and Russia Leading to the Historic 1975 ASTP Mission by Progressive Management
Cover of the book Essential Guide to China's Tiananmen Square Massacre 1989: Overview and History, Accounts of Survivors and Dissidents, Anniversary Hearings, Current Chinese Human Rights Abuses by Progressive Management
Cover of the book Oman in Perspective: Orientation Guide: Geography, History, Economy, Security, Muscat, Salalah, Nizwa, Yarubi Imamate, Sultan Qaboos bin Said, Baluchi, Lawatiyya, Khojas, Rustaq, Slave Trade by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy