What are the top three concerns of the dod

Assignment Help Management Theories
Reference no: EM131681486

Probelm: BUSINESS CASE Army Deploys Androids, Securely

The U.S. government's most IT-security sensitive organizations are the Army and National Security Agency (NSA). The Army and NSA decided to no longer reject mobile technologies or BYOD. Instead these Department of Defense (DoD) organizations looked for secure ways in which commercially available smartphones can be used to access IT systems. Performance and usability are also key concerns particularly because encryption caused latency (delays). Rather than build special handsets that are hardwired with secure components, the DoD choose to install its software on commercially available phones. This approach minimizes costs and allows the government to stay up to date with the latest phones on the market. Army Selects Customized Androids, Securely The Army does not permit any type of smartphone. The Army installs its own software on Android phones. Androids were selected because Google allows its code to be modified. The Androids are reengineered to store classified documents, but not to transmit data over a cell network.

This approach costs less than building special handsets and makes it easier for the Army to use the latest phones on the market. The Android needs to be customized to prevent apps from seeking more information than needed to function. For example, a weather or clock app with GPS capabilities identifies a user's location. The Army does not want to support apps that transmit locations over the network. NSA Due to the highly classified nature of its work, the NSA has some of the strictest requirements in government, including whole buildings that are labeled as Sensitive Compartmentalized Information Facilities, which have additional requirements. To comply with strict security requirements, most NSA employees had to leave their mobiles in their cars in the parking lot rather than bringing them in to work. In 2012, the agency worked on a plan to introduce secure, commercially available mobile devices and an architecture that enables other agencies to use mobiles with classified data. Troy Lange, NSA's mobility mission manager explains: "This is about bringing efficiencies and capabilities that people are used to in their everyday lives and extending that to our national security mission."

Questions: 1. In your opinion, will the outcome of these Army and NSA projects have a big impact throughout government? On the private sector as well?

2. What are the top three concerns of the DoD?

3. Do you agree that the Army and NSA deciding to allow the use of mobile technologies and to figure out how best to limit risks is encouraging news to the private sector? Explain your answer.

4. Research and describe the latest developments in the Army or NSA's mobile strategy. Does the Army still restrict their mobile strategy to Androids?

Reference no: EM131681486

Questions Cloud

Question-companies are said to be an artificial legal person : ASSIGNMENT QUESTION: "Companies are said to be an artificial legal person." To give effect to the pluralist view
Describe the recent trends in phishing attacks : Access the Anti-Phishing Working Group Web site (antiphishing.org) and download the most recent Phishing Activity Trends Report.
Discuss about the biometric devices or technologies : Research vendors of biometrics. Select one vendor, and discuss three of its biometric devices or technologies. Prepare a list of major capabilities.
Explain from where a corporation derives its authority. : Explain from where a corporation derives its authority. What is a wearable computing system?
What are the top three concerns of the dod : The U.S. government's most IT-security sensitive organizations are the Army and National Security Agency (NSA). The Army and NSA decided to no longer reject.
Discuss the importance of email in the workplace : Compare the author's take on email with your own professional / personal experience using email. Make a case for the importance of email in the workplace
Explain the importance of implementing lean manufacturing : Explain the importance of implementing lean manufacturing. Describe the eight general types of waste .
Explain the history of labor unions in our country : Explain the history of labor unions in our country and explain what the benefits, if any, were there when they began, and whether or not we need them today.
What are the concerns of the department of homeland security : Officials warn that computers and mobiles are not the only devices vulnerable to hack attacks. Information security risks are expanding to anything attached.

Reviews

Write a Review

Management Theories Questions & Answers

  Which is the more important market for your company

Make a list of consumer markets and business markets for your company's product or business offering. Which is the more important market for your company? Why?

  Explain the registration requirement

Registration Requirements. Langley Brothers, Inc., a corporation incorporated and doing business in Kansas, decides to sell no-par common stock worth $1 million

  Discuss the organisational fit of the procurement function

Discuss the organisational fit of the procurement function

  What would be the present value of deferred annuity

What would be the present value of deferred annuity?

  Define the concepts of servant leadership

Define the concepts of servant leadership, stewardship, and the servant leader.  How would you say they are similar and interrelated

  Determine which product is feasible for purchase

Data has been provided for you to generate a payment for each of the two products to help determine which product is feasible for you to purchase for school purposes. Click here to access the data.

  Discuss the validity of each claim

Arnold died some time later, and the deed and will were found in his safe. Burton, Connie, and Ernest claim the farm, and Donna claims dower. Discuss the validity of each claim.

  The article describe the trends in scope

Review the Project Management Institute's article entitled Driving Success in Challenging Times and then answer the following questions. Your responses should be thorough and include at least three references from outside sources (other than your ..

  Extremely fearful of pain and suffering and depended

Decedent, Joan Jones, a bedridden, lonely woman, eighty-six years old, owned outright Green acre, her ancestral estate. Baggers, her physician and friend, visited her weekly and was held in the highest regard by Joan.

  Examine the best practices found in the video on inventory

From the first e-Activity, examine the best practices found in the video on inventory management. Choose two service companies that manage inventory and compare and contrast their inventory management systems.

  Components that are required for data-driven decision making

Find and describe at least three technological components that are required for data-driven decision making. Be sure to explain how each component is relevant to business analytics

  Discuss and describe the term glass ceiling

Discuss and describe the term Glass Ceiling in term of management.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd