by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : March 2014
CYBEREYE BY WILLIAM JACKSON THE IDEA OF wearable technology is not new to gov- ernment. In the military, the concept of using hands-free technology to integrate sol- diers in the field into mobile ad hoc networks is part of the Defense Department s vision of network-centric warfare. But what happens when unmanaged personal or wearable devices are brought into the workplace to connect with the enterprise network? The result is another layer of security concerns for agen- cies that still are struggling with the challenges pre- sented by the bring-your- own-device movement. Some of the challenges presented by products such as Samsung Galaxy Gear and Google Glass are not new. In many ways, "it s just an alter- native form factor," said Paul Christman, Dell Software s vice president of public sector. "They are fairly consumer oriented, and they tend to be fairly low tech," mostly acting as sen- sors to gather data such as location and health metrics. The challenge with these devices is not only to secure the data they gather and the connec- tions they use but also to decide who owns and controls the data. Joggers who wear a fitness monitor might as- sume the data is theirs; but odds are they are sharing it with someone else, whether they know it or not. As devices become more sophisticated and are used to access data at work, they will have to be managed, and the data they access secured. Progress is being made in addressing the workplace security challenge in tradi- tional BYOD, often by com- partmentalizing the devices to create separate personal and work partitions. Typi- cally, the user cedes a degree of control over the personal device so that workplace IT administrators can enforce policy in the partitioned workspace. "The same model can ap- ply" in wearable technology, Christman said. "But how do you compartmentalize Google Glass?" Technologically, the chal- lenge is not that great. Based on their experience with laptops and smartphones, IT pros can port existing se- curity tools to the new form factors as the devices become sophisticated enough to ac- cept them. The real hurdle is making the decision to do so and doing it early enough that administrators do not find themselves in an endless loop of catch-up as the new technology comes online. Fortunately, the call for security is going out early. "There are a lot of people sounding the alarm from the get-go," Christman said. "Geolocation data is get- ting a lot of attention now. That s one of the things that needs to be addressed first." The security of local wire- less connection protocols used by small devices, such as Bluetooth and near field communication, also needs to be addressed. And along with the technology fixes there will have to be "polite rules of society" for when and where we use technology and when it s time to take the glasses off, Christman said. Rules such as "turn the camera off in the locker room" are probably a good idea. The social and legal niceties of mobile devic- es are no trivial matters. A man was shot to death in Florida last month in an apparent argument over texting in a movie theater, and a California woman was ticketed late last year for driving with Google Glass. The charge against the woman was dismissed in January, but the questions about liability and legality remain unanswered. • IS WEARABLE COMPUTING THE NEXT SECURITY PERIMETER? 12 GCN MARCH 2014 • GCN.COM What happens when wearable devices are brought into the workplace to connect with the enterprise network? Yet another layer of security concerns for agencies still struggling with the bring-your- own-device movement. WIKIMEDIA COMMONS