Rapidly Deployable Mobile Security Solutions for the Military: Navy Cyber Policies and Threats, Security, Mobile Devices, Bring Your Own Device (BYOD), Risk Management, Android Application Program
()
Currently unavailable
Currently unavailable
About this ebook
This important report has been professionally converted for accurate flowing-text e-book format reproduction. The Navy has seen a significant increase in the presence of mobile and smart devices on its units due to advancements in technology and younger sailors' desire to be connected at all times. These devices create security threats due to their easily concealable size and their host of connectivity and image related features. The insider threat (intentional or not) now includes the ability to take photos, record conversations, share data wirelessly, and communicate official use and classified information, all more easily than ever before.
Current enterprise solutions and associated policy does not address managing personal devices. In fact, management of personal devices is currently outside the Department of Defense (DOD) effort to control Personal Electronic Devices (PED) since the organization does not own the device and therefore has no way to mandate what must or must not be installed on them. The current path to a bring your own device (BYOD) policy is unclear. Security vulnerabilities with these devices have not been addressed in a uniform matter in policy or in practice. It is with these statements in mind that we address how to take the first steps in developing feasible management of personal devices on naval units and potentially throughout the DOD.
In this study, we provide a thorough evaluation of National Institute for Standards and Technology, Defense Information Systems Agency, and DOD publications to provide a starting point for adapting current policy and to guide the development of our application. We then examine the feasibility of implementable software application solutions to hardware features that pose a threat to security. Specific research addresses why each hardware feature on a mobile device is a security concern, how it is controlled inside the Android Studio API, and how we utilize these controls to lockdown and then unlock said hardware features through a simple proof of concept Android application. Finally, we provide examples of how future work can grow our application into a security-manager controlled program to secure devices and find a path toward making BYOD a reality.
Progressive Management
Progressive Management: For over a quarter of a century, our news, educational, technical, scientific, and medical publications have made unique and valuable references accessible to all people. Our imprints include PM Medical Health News, Advanced Professional Education and News Service, Auto Racing Analysis, and World Spaceflight News. Many of our publications synthesize official information with original material. They are designed to provide a convenient user-friendly reference work to uniformly present authoritative knowledge that can be rapidly read, reviewed or searched. Vast archives of important data that might otherwise remain inaccessible are available for instant review no matter where you are. The e-book format makes a great reference work and educational tool. There is no other reference book that is as convenient, comprehensive, thoroughly researched, and portable - everything you need to know, from renowned experts you trust. Our e-books put knowledge at your fingertips, and an expert in your pocket!
Related to Rapidly Deployable Mobile Security Solutions for the Military
Related ebooks
Mobile Security Fundamentals: A Guide for CompTIA Security+ 601 Exam Rating: 0 out of 5 stars0 ratingsMobile Data Loss: Threats and Countermeasures Rating: 0 out of 5 stars0 ratingsAndroid Application Security Essentials Rating: 0 out of 5 stars0 ratingsMobile Security Products for Android: (No) Security for the Android Platform Rating: 0 out of 5 stars0 ratingsLearning iOS Penetration Testing Rating: 0 out of 5 stars0 ratingsInternet of Things Security: Principles and Practice Rating: 0 out of 5 stars0 ratingsLearning Pentesting for Android Devices Rating: 5 out of 5 stars5/5Mobile Malware Infringement and Detection Rating: 0 out of 5 stars0 ratingsEmbedded Systems Security: Practical Methods for Safe and Secure Software and Systems Development Rating: 5 out of 5 stars5/5Secure Intelligent Machines: Protecting AI from Cyberattack Rating: 0 out of 5 stars0 ratingsEmerging Topics in Hardware Security Rating: 0 out of 5 stars0 ratingsAutomated Security Analysis of Android and iOS Applications with Mobile Security Framework Rating: 1 out of 5 stars1/5Mobile Security: A Pocket Guide Rating: 0 out of 5 stars0 ratingsDesigning Secure IoT Devices with the Arm Platform Security Architecture and Cortex-M33 Rating: 0 out of 5 stars0 ratingsMastering Cyber Security A Comprehensive Guide: cyber security, #2 Rating: 0 out of 5 stars0 ratingsWearable Technology Trends: Marketing Hype or True Customer Value? Rating: 0 out of 5 stars0 ratingsFortifying Digital Fortress: A Comprehensive Guide to Information Systems Security: GoodMan, #1 Rating: 0 out of 5 stars0 ratingsMobile Security: How to secure, privatize and recover your devices Rating: 5 out of 5 stars5/5Securing Critical Infrastructures Rating: 0 out of 5 stars0 ratingsNetwork Security Traceback Attack and React in the United States Department of Defense Network Rating: 0 out of 5 stars0 ratingsLearning Android Forensics Rating: 4 out of 5 stars4/5RIoT Control: Understanding and Managing Risks and the Internet of Things Rating: 5 out of 5 stars5/5Mastering Mobile Forensics Rating: 0 out of 5 stars0 ratingsMeeting People via WiFi and Bluetooth Rating: 0 out of 5 stars0 ratingsCISSP Exam Study Guide: NIST Framework, Digital Forensics & Cybersecurity Governance Rating: 5 out of 5 stars5/5Cybersecurity for Beginners : Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide: 1 Rating: 0 out of 5 stars0 ratingsInternet of Things & Wireless Sensor Network Rating: 0 out of 5 stars0 ratings
Wars & Military For You
Masters of the Air: America's Bomber Boys Who Fought the Air War Against Nazi Germany Rating: 4 out of 5 stars4/5On Killing: The Psychological Cost of Learning to Kill in War and Society Rating: 4 out of 5 stars4/5Sun Tzu's The Art of War: Bilingual Edition Complete Chinese and English Text Rating: 4 out of 5 stars4/5The Art of War Rating: 4 out of 5 stars4/5Resistance: The Warsaw Ghetto Uprising Rating: 4 out of 5 stars4/5Killing the SS: The Hunt for the Worst War Criminals in History Rating: 4 out of 5 stars4/5The Last Kingdom Rating: 4 out of 5 stars4/5The Rise and Fall of the Third Reich Rating: 4 out of 5 stars4/5A Daily Creativity Journal Rating: 3 out of 5 stars3/5Ordinary Men: Reserve Police Battalion 101 and the Final Solution in Poland Rating: 4 out of 5 stars4/5The Doomsday Machine: Confessions of a Nuclear War Planner Rating: 4 out of 5 stars4/5The Ethnic Cleansing of Palestine Rating: 4 out of 5 stars4/5How to Hide an Empire: A History of the Greater United States Rating: 4 out of 5 stars4/5Art of War: The Definitive Interpretation of Sun Tzu's Classic Book of Strategy Rating: 4 out of 5 stars4/5Blitzed: Drugs in the Third Reich Rating: 4 out of 5 stars4/5The Making of the Atomic Bomb Rating: 5 out of 5 stars5/5The Faithful Spy: Dietrich Bonhoeffer and the Plot to Kill Hitler Rating: 5 out of 5 stars5/5The Art of War & Other Classics of Eastern Philosophy Rating: 4 out of 5 stars4/5Mein Kampf: The Original, Accurate, and Complete English Translation Rating: 0 out of 5 stars0 ratings77 Days of February: Living and Dying in Ukraine, Told by the Nation’s Own Journalists Rating: 5 out of 5 stars5/5The God Delusion Rating: 4 out of 5 stars4/5The Only Plane in the Sky: An Oral History of 9/11 Rating: 5 out of 5 stars5/5The Rise of the Fourth Reich: The Secret Societies That Threaten to Take Over America Rating: 4 out of 5 stars4/5Band of Brothers: E Company, 506th Regiment, 101st Airborne from Normandy to Hitler's Eagle's Nest Rating: 5 out of 5 stars5/5Unacknowledged: An Expose of the World's Greatest Secret Rating: 5 out of 5 stars5/5Doctors From Hell: The Horrific Account of Nazi Experiments on Humans Rating: 4 out of 5 stars4/5The Girls of Atomic City: The Untold Story of the Women Who Helped Win World War II Rating: 4 out of 5 stars4/5God Is Not One: The Eight Rival Religions That Run the World--and Why Their Differences Matter Rating: 4 out of 5 stars4/5
Reviews for Rapidly Deployable Mobile Security Solutions for the Military
0 ratings0 reviews