Rapidly Deployable Mobile Security Solutions for the Military: Navy Cyber Policies and Threats, Security, Mobile Devices, Bring Your Own Device (BYOD), Risk Management, Android Application Program Rapidly Deployable Mobile Security Solutions for the Military: Navy Cyber Policies and Threats, Security, Mobile Devices, Bring Your Own Device (BYOD), Risk Management, Android Application Program

Rapidly Deployable Mobile Security Solutions for the Military: Navy Cyber Policies and Threats, Security, Mobile Devices, Bring Your Own Device (BYOD), Risk Management, Android Application Program

    • $12.99
    • $12.99

Publisher Description

This important report has been professionally converted for accurate flowing-text e-book format reproduction. The Navy has seen a significant increase in the presence of mobile and smart devices on its units due to advancements in technology and younger sailors' desire to be connected at all times. These devices create security threats due to their easily concealable size and their host of connectivity and image related features. The insider threat (intentional or not) now includes the ability to take photos, record conversations, share data wirelessly, and communicate official use and classified information, all more easily than ever before.
Current enterprise solutions and associated policy does not address managing personal devices. In fact, management of personal devices is currently outside the Department of Defense (DOD) effort to control Personal Electronic Devices (PED) since the organization does not own the device and therefore has no way to mandate what must or must not be installed on them. The current path to a bring your own device (BYOD) policy is unclear. Security vulnerabilities with these devices have not been addressed in a uniform matter in policy or in practice. It is with these statements in mind that we address how to take the first steps in developing feasible management of personal devices on naval units and potentially throughout the DOD.
In this study, we provide a thorough evaluation of National Institute for Standards and Technology, Defense Information Systems Agency, and DOD publications to provide a starting point for adapting current policy and to guide the development of our application. We then examine the feasibility of implementable software application solutions to hardware features that pose a threat to security. Specific research addresses why each hardware feature on a mobile device is a security concern, how it is controlled inside the Android Studio API, and how we utilize these controls to lockdown and then unlock said hardware features through a simple proof of concept Android application. Finally, we provide examples of how future work can grow our application into a security-manager controlled program to secure devices and find a path toward making BYOD a reality.

GENRE
History
RELEASED
2016
9 October
LANGUAGE
EN
English
LENGTH
245
Pages
PUBLISHER
Progressive Management
SELLER
Draft2Digital, LLC
SIZE
293.2
KB

More Books Like This

Mobile Security and Privacy Mobile Security and Privacy
2016
Information Security Management Handbook, Volume 6 Information Security Management Handbook, Volume 6
2016
IBM MobileFirst in Action for mGovernment and Citizen Mobile Services IBM MobileFirst in Action for mGovernment and Citizen Mobile Services
2015
Information Security Management Handbook Information Security Management Handbook
2019
Risk Assessment for Asset Owners Risk Assessment for Asset Owners
2007
The IoT Architect's Guide to Attainable Security and Privacy The IoT Architect's Guide to Attainable Security and Privacy
2019

More Books by Progressive Management

War in the Balkans, 1991-2002: Comprehensive History of Wars Provoked by Yugoslav Collapse: Balkan Region in World Politics, Slovenia and Croatia, Bosnia-Herzegovina, Kosovo, Greece, Turkey, Cyprus War in the Balkans, 1991-2002: Comprehensive History of Wars Provoked by Yugoslav Collapse: Balkan Region in World Politics, Slovenia and Croatia, Bosnia-Herzegovina, Kosovo, Greece, Turkey, Cyprus
2014
A Tradecraft Primer: Structured Analytic Techniques for Improving Intelligence Analysis - Cognitive and Perceptual Biases, Reasoning Processes A Tradecraft Primer: Structured Analytic Techniques for Improving Intelligence Analysis - Cognitive and Perceptual Biases, Reasoning Processes
2012
Flight Research: Problems Encountered and What They Should Teach Us - Lunar Landing Research Vehicle, X-15, YF-12 Blackbird, P-51 Mustang, Lifting Bodies Flight Research: Problems Encountered and What They Should Teach Us - Lunar Landing Research Vehicle, X-15, YF-12 Blackbird, P-51 Mustang, Lifting Bodies
2012
The Smell of Kerosene: A Test Pilot's Odyssey - NASA Research Pilot Stories, XB-70 Tragic Collision, M2-F1 Lifting Body, YF-12 Blackbird, Apollo LLRV Lunar Landing Research Vehicle (NASA SP-4108) The Smell of Kerosene: A Test Pilot's Odyssey - NASA Research Pilot Stories, XB-70 Tragic Collision, M2-F1 Lifting Body, YF-12 Blackbird, Apollo LLRV Lunar Landing Research Vehicle (NASA SP-4108)
2012
Joint Theater Trauma System Clinical Practice Guidelines - Practical Emergency Information for Critical Trauma Care, Burns, Compartment Syndrome, Wounds, Head and Spine (Emergency War Surgery Series) Joint Theater Trauma System Clinical Practice Guidelines - Practical Emergency Information for Critical Trauma Care, Burns, Compartment Syndrome, Wounds, Head and Spine (Emergency War Surgery Series)
2012
21st Century U.S. Military Manuals: Sniper Training - FM 23-10 - Marksmanship, Equipment, Ballistics, Weapon Capabilities, Sniping Techniques (Value-Added Professional Format Series) 21st Century U.S. Military Manuals: Sniper Training - FM 23-10 - Marksmanship, Equipment, Ballistics, Weapon Capabilities, Sniping Techniques (Value-Added Professional Format Series)
2011