Rapidly Deployable Mobile Security Solutions for the Military: Navy Cyber Policies and Threats, Security, Mobile Devices, Bring Your Own Device (BYOD), Risk Management, Android Application Program

Nonfiction, History, Military, Weapons, Computers, Computer Hardware
Cover of the book Rapidly Deployable Mobile Security Solutions for the Military: Navy Cyber Policies and Threats, Security, Mobile Devices, Bring Your Own Device (BYOD), Risk Management, Android Application Program by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370717897
Publisher: Progressive Management Publication: October 9, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370717897
Publisher: Progressive Management
Publication: October 9, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. The Navy has seen a significant increase in the presence of mobile and smart devices on its units due to advancements in technology and younger sailors' desire to be connected at all times. These devices create security threats due to their easily concealable size and their host of connectivity and image related features. The insider threat (intentional or not) now includes the ability to take photos, record conversations, share data wirelessly, and communicate official use and classified information, all more easily than ever before.
Current enterprise solutions and associated policy does not address managing personal devices. In fact, management of personal devices is currently outside the Department of Defense (DOD) effort to control Personal Electronic Devices (PED) since the organization does not own the device and therefore has no way to mandate what must or must not be installed on them. The current path to a bring your own device (BYOD) policy is unclear. Security vulnerabilities with these devices have not been addressed in a uniform matter in policy or in practice. It is with these statements in mind that we address how to take the first steps in developing feasible management of personal devices on naval units and potentially throughout the DOD.
In this study, we provide a thorough evaluation of National Institute for Standards and Technology, Defense Information Systems Agency, and DOD publications to provide a starting point for adapting current policy and to guide the development of our application. We then examine the feasibility of implementable software application solutions to hardware features that pose a threat to security. Specific research addresses why each hardware feature on a mobile device is a security concern, how it is controlled inside the Android Studio API, and how we utilize these controls to lockdown and then unlock said hardware features through a simple proof of concept Android application. Finally, we provide examples of how future work can grow our application into a security-manager controlled program to secure devices and find a path toward making BYOD a reality.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. The Navy has seen a significant increase in the presence of mobile and smart devices on its units due to advancements in technology and younger sailors' desire to be connected at all times. These devices create security threats due to their easily concealable size and their host of connectivity and image related features. The insider threat (intentional or not) now includes the ability to take photos, record conversations, share data wirelessly, and communicate official use and classified information, all more easily than ever before.
Current enterprise solutions and associated policy does not address managing personal devices. In fact, management of personal devices is currently outside the Department of Defense (DOD) effort to control Personal Electronic Devices (PED) since the organization does not own the device and therefore has no way to mandate what must or must not be installed on them. The current path to a bring your own device (BYOD) policy is unclear. Security vulnerabilities with these devices have not been addressed in a uniform matter in policy or in practice. It is with these statements in mind that we address how to take the first steps in developing feasible management of personal devices on naval units and potentially throughout the DOD.
In this study, we provide a thorough evaluation of National Institute for Standards and Technology, Defense Information Systems Agency, and DOD publications to provide a starting point for adapting current policy and to guide the development of our application. We then examine the feasibility of implementable software application solutions to hardware features that pose a threat to security. Specific research addresses why each hardware feature on a mobile device is a security concern, how it is controlled inside the Android Studio API, and how we utilize these controls to lockdown and then unlock said hardware features through a simple proof of concept Android application. Finally, we provide examples of how future work can grow our application into a security-manager controlled program to secure devices and find a path toward making BYOD a reality.

More books from Progressive Management

Cover of the book 2015 Osama bin Laden's Bookshelf: Complete Declassified Documents and Letters by the Terrorist Leader on Wide Range of Topics, plus Letters from Abbottabad (Usama bin Ladin and al Qaeda) by Progressive Management
Cover of the book Nunn: Lugar Cooperative Threat Reduction Program: Origins of Nuclear Weapons Control Initiative, Soviet Union, Beyond Nunn - Lugar: Curbing Next Wave of Weapons Proliferation Threats From Russia by Progressive Management
Cover of the book Built to Last: The Army's Failed Quest to Replace the Bradley Fighting Vehicle (BFV) - Army Modernization Efforts for Infantry Fighting Vehicles, Strategic Context, Requirements, and Cost by Progressive Management
Cover of the book Air Force Targeting Roadmap: Reinvigorating Targeting, Reachback and Distributed Operations, Systems, Tools, Architectures, Training, Force Management, Precision Munition Bombing Air Campaign by Progressive Management
Cover of the book Complete Guide to World War II's Forgotten War: The Aleutian Campaign in Alaska and North Pacific Against Japan - Kiska, Attu, Komandorski Islands, Operation Landcrab, Cold Weather Fighting, Navy by Progressive Management
Cover of the book Air Force Doctrine Document 3-22: Foreign Internal Defense - Counterinsurgency, Indirect Support, Trainer-Advisor Teams, Revolutionary Movements, Insurgencies, El Salvador, Philippines, Cambodia by Progressive Management
Cover of the book Russia and Vladimir Putin: Studies and Reports on Politics, Economics, Security Strategy, New Eurasia, Threat Perception, Growing Russo-American Tensions, Crimea, Target: Ukraine, Corruption by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: National Guard Counterdrug Support - Authorized Missions, Use of Counterdrug Assets for Non-Counterdrug Missions, Arming of Troops and Use of Force by Progressive Management
Cover of the book 21st Century FEMA Study Course: National Incident Management System (NIMS) Resource Management (IS-703.a) - Scenarios, Complex Incidents, Planning, Readiness by Progressive Management
Cover of the book 2012 Funding Alternatives for Emergency Medical and Fire Services: Writing Effective Grant Proposals, Local, State and Federal Funding for EMS and Fire, Foundations and Corporate Grants by Progressive Management
Cover of the book A North Korean Social Revolution in the Democratic People's Republic of Korea (DPRK) - Exploration of Special Operations Forces Removing Regime Through Unconventional Warfare and Resistance Elements by Progressive Management
Cover of the book 21st Century Adult Cancer Sourcebook: Cervical Cancer (Uterine Cervix) - Clinical Data for Patients, Families, and Physicians by Progressive Management
Cover of the book Lessons from Fukushima: Relocation and Recovery from Nuclear Catastrophe - Radiological, Chernobyl, Risk Communication, Public Information, Property Compensation, Radiation Dose Range, Dosimeters by Progressive Management
Cover of the book Science Training History of the Apollo Astronauts (NASA SP-2015-626) - Missions, Shoemaker, Meteor Crater, Field Trips, Rover Simulations, Lunar Geology, Rock and Mineral Lessons, Geologist Schmitt by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: The Targeting Process - Field Manual 3-60 - Principles and Philosophy, Dynamic Targeting (Professional Format Series) by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy