Rapidly Deployable Mobile Security Solutions for the Military: Navy Cyber Policies and Threats, Security, Mobile Devices, Bring Your Own Device (BYOD), Risk Management, Android Application Program

Nonfiction, History, Military, Weapons, Computers, Computer Hardware
Cover of the book Rapidly Deployable Mobile Security Solutions for the Military: Navy Cyber Policies and Threats, Security, Mobile Devices, Bring Your Own Device (BYOD), Risk Management, Android Application Program by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370717897
Publisher: Progressive Management Publication: October 9, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370717897
Publisher: Progressive Management
Publication: October 9, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. The Navy has seen a significant increase in the presence of mobile and smart devices on its units due to advancements in technology and younger sailors' desire to be connected at all times. These devices create security threats due to their easily concealable size and their host of connectivity and image related features. The insider threat (intentional or not) now includes the ability to take photos, record conversations, share data wirelessly, and communicate official use and classified information, all more easily than ever before.
Current enterprise solutions and associated policy does not address managing personal devices. In fact, management of personal devices is currently outside the Department of Defense (DOD) effort to control Personal Electronic Devices (PED) since the organization does not own the device and therefore has no way to mandate what must or must not be installed on them. The current path to a bring your own device (BYOD) policy is unclear. Security vulnerabilities with these devices have not been addressed in a uniform matter in policy or in practice. It is with these statements in mind that we address how to take the first steps in developing feasible management of personal devices on naval units and potentially throughout the DOD.
In this study, we provide a thorough evaluation of National Institute for Standards and Technology, Defense Information Systems Agency, and DOD publications to provide a starting point for adapting current policy and to guide the development of our application. We then examine the feasibility of implementable software application solutions to hardware features that pose a threat to security. Specific research addresses why each hardware feature on a mobile device is a security concern, how it is controlled inside the Android Studio API, and how we utilize these controls to lockdown and then unlock said hardware features through a simple proof of concept Android application. Finally, we provide examples of how future work can grow our application into a security-manager controlled program to secure devices and find a path toward making BYOD a reality.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. The Navy has seen a significant increase in the presence of mobile and smart devices on its units due to advancements in technology and younger sailors' desire to be connected at all times. These devices create security threats due to their easily concealable size and their host of connectivity and image related features. The insider threat (intentional or not) now includes the ability to take photos, record conversations, share data wirelessly, and communicate official use and classified information, all more easily than ever before.
Current enterprise solutions and associated policy does not address managing personal devices. In fact, management of personal devices is currently outside the Department of Defense (DOD) effort to control Personal Electronic Devices (PED) since the organization does not own the device and therefore has no way to mandate what must or must not be installed on them. The current path to a bring your own device (BYOD) policy is unclear. Security vulnerabilities with these devices have not been addressed in a uniform matter in policy or in practice. It is with these statements in mind that we address how to take the first steps in developing feasible management of personal devices on naval units and potentially throughout the DOD.
In this study, we provide a thorough evaluation of National Institute for Standards and Technology, Defense Information Systems Agency, and DOD publications to provide a starting point for adapting current policy and to guide the development of our application. We then examine the feasibility of implementable software application solutions to hardware features that pose a threat to security. Specific research addresses why each hardware feature on a mobile device is a security concern, how it is controlled inside the Android Studio API, and how we utilize these controls to lockdown and then unlock said hardware features through a simple proof of concept Android application. Finally, we provide examples of how future work can grow our application into a security-manager controlled program to secure devices and find a path toward making BYOD a reality.

More books from Progressive Management

Cover of the book 21st Century U.S. Military Documents: Meteorological and Oceanographic Operations (Joint Publication 3-59) - 2012 Version, Collection, Analysis, Prediction, Data Sources by Progressive Management
Cover of the book Rolling Thunder 1965: Anatomy of a Failure - Airpower Against North Vietnam, Enduring Enigma of the Vietnam War, American Air Power Doctrine, President Johnson's Target Selection and Military Distrust by Progressive Management
Cover of the book Striking the Balance between Discipline and Justice: The Commander's Role in the Military Justice System and its Impact on the Military Profession - Sexual Assault Scandals and History of Justice by Progressive Management
Cover of the book Military Professionalism and Political Influence: A Case Study of the Mexican Military, 1917-1940 - Pancho Villa, Mexican Revolution, Carranza, Obregon, Calles, Cardenas Years, Latin America by Progressive Management
Cover of the book Unmanned Systems Integrated Roadmap FY2013-2038 - Unmanned Aircraft Systems (UAS), Drones, Unmanned Maritime Systems, Technologies, Logistics, Sustainment, Training, International, Foreign Sales by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Rifle Marksmanship Field Manual (M16A1, M16A2/3, M16A4, and M4 Carbine) FM 3-22.9 - FM 23-9 (Value-Added Professional Format Series) by Progressive Management
Cover of the book The Future of NATO: Russian Relations - or How to Dance with a Bear and Not Get Mauled, Vladimir Putin, Former Soviet Union and Warsaw Pact States, OSCE, Response and Perspectives, Road to Rome by Progressive Management
Cover of the book NASA and the Environment: The Case of Ozone Depletion (NASA SP-2005-4538) by Progressive Management
Cover of the book The Hotel Industry's Role in Combatting Sex Trafficking: Employee Training on Proactive, Zero-Tolerance Human Trafficking Stance, Need for Incentive-based Reporting System for Hospitality Industry by Progressive Management
Cover of the book The Continental Army: War of American Independence (the Revolutionary War) - Basic Reference on the Military History of the Revolution, from New England in Arms to Victory at Yorktown by Progressive Management
Cover of the book The Economic Impact of Terrorism in the Near East: Understanding the Threats Posed by Militant Groups - Role of Counterinsurgency, Counterterrorism, Guerilla Warfare, Defense Strategy Implications by Progressive Management
Cover of the book Forward Deployment of U.S. Naval Forces to Australia: Security Environment, Logistics Costs, Ports, WESTPAC, Deployment Policy, Political Viability, Past U.S. Basing in Australia by Progressive Management
Cover of the book Coercive Nuclear Campaigns in the 21st Century: Understanding Adversary Incentives and Options for Nuclear Escalation - Posing Four Grim Options, Plausibility of Conquest, U.S. Nuclear Forces by Progressive Management
Cover of the book National Space Weather Action Plan and Strategy: Potential Effects - Power Outages, Infrastructure, Communication, Mitigation Plans, Forecasting, Induced Geo-Electric Fields, Solar Radio Bursts (SRBs) by Progressive Management
Cover of the book 21st Century VA Independent Study Course: Visual Impairment and Blindness, Vision Loss, Eye Pathologies, Training Programs, Low Vision, Blind Rehabilitation, Psychological and Family Implications by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy