Rapidly Deployable Mobile Security Solutions for the Military: Navy Cyber Policies and Threats, Security, Mobile Devices, Bring Your Own Device (BYOD), Risk Management, Android Application Program

Nonfiction, History, Military, Weapons, Computers, Computer Hardware
Cover of the book Rapidly Deployable Mobile Security Solutions for the Military: Navy Cyber Policies and Threats, Security, Mobile Devices, Bring Your Own Device (BYOD), Risk Management, Android Application Program by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370717897
Publisher: Progressive Management Publication: October 9, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370717897
Publisher: Progressive Management
Publication: October 9, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. The Navy has seen a significant increase in the presence of mobile and smart devices on its units due to advancements in technology and younger sailors' desire to be connected at all times. These devices create security threats due to their easily concealable size and their host of connectivity and image related features. The insider threat (intentional or not) now includes the ability to take photos, record conversations, share data wirelessly, and communicate official use and classified information, all more easily than ever before.
Current enterprise solutions and associated policy does not address managing personal devices. In fact, management of personal devices is currently outside the Department of Defense (DOD) effort to control Personal Electronic Devices (PED) since the organization does not own the device and therefore has no way to mandate what must or must not be installed on them. The current path to a bring your own device (BYOD) policy is unclear. Security vulnerabilities with these devices have not been addressed in a uniform matter in policy or in practice. It is with these statements in mind that we address how to take the first steps in developing feasible management of personal devices on naval units and potentially throughout the DOD.
In this study, we provide a thorough evaluation of National Institute for Standards and Technology, Defense Information Systems Agency, and DOD publications to provide a starting point for adapting current policy and to guide the development of our application. We then examine the feasibility of implementable software application solutions to hardware features that pose a threat to security. Specific research addresses why each hardware feature on a mobile device is a security concern, how it is controlled inside the Android Studio API, and how we utilize these controls to lockdown and then unlock said hardware features through a simple proof of concept Android application. Finally, we provide examples of how future work can grow our application into a security-manager controlled program to secure devices and find a path toward making BYOD a reality.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. The Navy has seen a significant increase in the presence of mobile and smart devices on its units due to advancements in technology and younger sailors' desire to be connected at all times. These devices create security threats due to their easily concealable size and their host of connectivity and image related features. The insider threat (intentional or not) now includes the ability to take photos, record conversations, share data wirelessly, and communicate official use and classified information, all more easily than ever before.
Current enterprise solutions and associated policy does not address managing personal devices. In fact, management of personal devices is currently outside the Department of Defense (DOD) effort to control Personal Electronic Devices (PED) since the organization does not own the device and therefore has no way to mandate what must or must not be installed on them. The current path to a bring your own device (BYOD) policy is unclear. Security vulnerabilities with these devices have not been addressed in a uniform matter in policy or in practice. It is with these statements in mind that we address how to take the first steps in developing feasible management of personal devices on naval units and potentially throughout the DOD.
In this study, we provide a thorough evaluation of National Institute for Standards and Technology, Defense Information Systems Agency, and DOD publications to provide a starting point for adapting current policy and to guide the development of our application. We then examine the feasibility of implementable software application solutions to hardware features that pose a threat to security. Specific research addresses why each hardware feature on a mobile device is a security concern, how it is controlled inside the Android Studio API, and how we utilize these controls to lockdown and then unlock said hardware features through a simple proof of concept Android application. Finally, we provide examples of how future work can grow our application into a security-manager controlled program to secure devices and find a path toward making BYOD a reality.

More books from Progressive Management

Cover of the book The Neglect of Long-Range Escort Development During the Interwar Years (1918-1943) - P-51 Mustang, Martin B-10 Bomber, Boeing P-26, Consolidated B-30, Major General Claire Chennault by Progressive Management
Cover of the book National Defense Intelligence College Paper: The Creation of the National Imagery and Mapping Agency: Congress's Role as Overseer - Colin Powell, John Glenn, Newt Gingrich, CIA by Progressive Management
Cover of the book Brazil's Rise to Global Power: Bolsa Familia, Neoliberal Reform and Trade Partnerships, Military Capabilities, Defense Spending, Soft Power Projection, Role in International Organizations by Progressive Management
Cover of the book 21st Century Military Documents: Multi-Service Tactics, Techniques, and Procedures for Defense Support of Civil Authorities (DSCA), Integrating with National Guard Civil Support ATP 3-28.1(FM 3-28.1) by Progressive Management
Cover of the book The Spoken Word: Recollections of Dryden History, The Early Years (NASA SP-2003-4530) - Scott Crossfield Interview, Muroc, NACA Research, X-1 Project by Progressive Management
Cover of the book The Air Campaign: John Warden and the Classical Airpower Theorists - Giulio Douhet, Hugh Trenchard, Billy Mitchell, World War I Context, New World, British Empire, Continental Theories, Gulf War by Progressive Management
Cover of the book U.S. Air Force Aerospace Mishap Reports: Accident Investigation Boards for A-10 Warthog Close Air Support Aircraft 2011 and 2010, C-17 Globemaster Transport Plane 2010, CV-22 Osprey 2010 by Progressive Management
Cover of the book Mind-Sets and Missiles: A First Hand Account of the Cuban Missile Crisis - Detailed Chronology of Intelligence Failures and Successes, President Kennedy and the Soviet Missiles in Cuba by Progressive Management
Cover of the book Guide to Women in the Military: History, Analysis, Key Issues, Marine Corps Testing, Navy and Women, America's Women Veterans by Progressive Management
Cover of the book Between Heroes and Guardians: General Lyman L. Lemnitzer and General Charles H. Bonesteel III - World War II and Cold War, Operation Torch, Project Solarium, Interwar Period and Wartime Careers by Progressive Management
Cover of the book Deliberate Force: A Case Study in Effective Air Campaigning - Final Report of the Air University Balkans Air Campaign Study - Demise of Yugoslavia, Destruction of Bosnia, Tactics, Aircraft, Weapons by Progressive Management
Cover of the book Protection of Shipping: A Forgotten Mission with Many New Challenges - Admiral Alfred Thayer Mahan, Merchant Shipping, Naval Cooperation and Guidance for Shipping (NCAGS), Historical Perspective by Progressive Management
Cover of the book The Iran-Iraq War: Exceeding Means - Analysis of the Decision of Saddam Hussein to Invade Iran, Longest and Bloodiest War in Middle Eastern History, Ayatollah, Shia Unrest, Sunni, Bathist Regime by Progressive Management
Cover of the book The U.S. Air Force After Vietnam: Postwar Challenges and Potential for Responses - Vietnam in History, Interpreting Vietnam, Post-Vietnam Events and Public Discourse, Congress by Progressive Management
Cover of the book Canine-Assisted Therapy in Military Medicine: Dogs and Human Mental Health, Wounded Warriors, Occupational Therapy, Combat Veterans, History of Army Dogs, PTSD, Nonmilitary Settings, Stress Control by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy