Show simple item record

dc.contributor.advisorShing, Man-Tak
dc.contributor.authorDorney, Liam J.
dc.contributor.authorMiller, Travis C.
dc.dateMar-16
dc.date.accessioned2016-04-29T21:19:21Z
dc.date.available2016-04-29T21:19:21Z
dc.date.issued2016-03
dc.identifier.urihttp://hdl.handle.net/10945/48512
dc.descriptionApproved for public release; distribution is unlimiteden_US
dc.description.abstractThe Navy has seen a significant increase in the presence of mobile and smart devices on its units due to advancements in technology and younger sailors’ desire to be connected at all times. These devices create security threats due to their easily concealable size and their host of connectivity and image related features. The insider threat (intentional or not) now includes the ability to take photos, record conversations, share data wirelessly, and communicate official use and classified information, all more easily than ever before. Current enterprise solutions and associated policy does not address managing personal devices. In fact, management of personal devices is currently outside the Department of Defense (DOD) effort to control Personal Electronic Devices (PED) since the organization does not own the device and therefore has no way to mandate what must or must not be installed on them. The current path to a bring your own device (BYOD) policy is unclear. Security vulnerabilities with these devices have not been addressed in a uniform matter in policy or in practice. It is with these statements in mind that we address how to take the first steps in developing feasible management of personal devices on naval units and potentially throughout the DOD. In this thesis, we provide a thorough evaluation of National Institute for Standards and Technology, Defense Information Systems Agency, and DOD publications to provide a starting point for adapting current policy and to guide the development of our application. We then examine the feasibility of implementable software application solutions to hardware features that pose a threat to security. Specific research addresses why each hardware feature on a mobile device is a security concern, how it is controlled inside the Android Studio API, and how we utilize these controls to lockdown and then unlock said hardware features through a simple proof of concept Android application. Finally, we provide examples of how future work can grow our application into a security-manager controlled program to secure devices and find a path toward making BYOD a reality.en_US
dc.description.urihttp://archive.org/details/rapidlydeployabl1094548512
dc.publisherMonterey, California: Naval Postgraduate Schoolen_US
dc.rightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United Statesen_US
dc.titleRapidly deployable mobile security solutionen_US
dc.typeThesisen_US
dc.contributor.secondreaderDas, Arijit
dc.contributor.departmentComputer Science
dc.contributor.departmentComputer Scienceen_US
dc.subject.authormobile deviceen_US
dc.subject.authormobile securityen_US
dc.subject.authorandroid application programen_US
dc.subject.authorbring your own device (BYOD)en_US
dc.subject.authorcyber securityen_US
dc.subject.authorcyber policyen_US
dc.subject.authorinsider threaten_US
dc.subject.authorU.S. Navy cyber policyen_US
dc.subject.authorrisk managementen_US
dc.description.recognitionOutstanding Thesisen_US
dc.description.serviceLieutenant, United States Navyen_US
etd.thesisdegree.nameMaster of Science in Computer Scienceen_US
etd.thesisdegree.levelMastersen_US
etd.thesisdegree.disciplineComputer Scienceen_US
etd.thesisdegree.grantorNaval Postgraduate Schoolen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record