Security concerns in accessing Naval e-Learning with personal mobile devices
Author
Mitchell, Keystella R.
Date
2014-12Advisor
Shing, Man-Tak
Das, Arijit
Metadata
Show full item recordAbstract
The purpose of this study was to investigate the feasibility of using personal mobile devices for Naval e-Learning
(NeL). Another objective was to find out which mobile device and which method of authentication offers the most
practical and secure form of essentially bring your own device (BYOD). The use of personal mobile devices to
access NeL is a form of BYOD. Finally, Virtual Desktop Infrastructure (VDI) was examined in this study as
another secured means to access NeL from BYOD.
This study tested the various mobile devices that were Department of Defense (DOD) approved for network
use. The study also tested the Common Access Card (CAC) readers that are approved by DOD for CAC
authentication against the approved mobile devices. Then the mobile devices and CAC readers’ functionality were
tested in a VDI environment to examine the various layers of security that could be implemented when using
BYOD on DOD networks to maintain the necessary level of information protection.
The results of this study show the iOS devices were capable of accessing NeL training site via the approved
CAC readers. However, the iOS devices could only access and enroll, they were unable to launch training due to
Flash not being supported by the native browser, the language used to develop NeL training. The results also
revealed attempts to use the iOS device and CAC in a VDI to be unsuccessful as a work around to the Flash issue
with the iOS browser.
The principal conclusion is that through the use of multi-layer security BYOD could be used to access NeL—
making it truly available “whenever and wherever.” There is also a need to look into ways authentication can be
done without the use of hardware readers. Finally, there is also the need to develop training to support multiple
browsers.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
Mobility for GCSS-MC through virtual PCs
Thompson, Steven K. (Monterey, California: Naval Postgraduate School, 2017-06);The ability for Marines to access Global Combat Support System-Marine Corps (GCSS-MC) through mobile devices such as tablets and smart phones would greatly improve their productivity. Mobile device access to GCSS-MC would ... -
INTEGRATION OF INTEROPERABLE ANDROID-BASED COMMAND AND CONTROL SYSTEMS TO CREATE MORE REALISTIC TACTICAL TRAINING
Weissenberger, Bernd (Monterey, CA; Naval Postgraduate School, 2021-06);This thesis focuses on the interoperability of Android mobile devices during live military training to model the dynamic nature of adversarial forces and enhance realism. The research explores the efficient and effective ... -
THE KEY TO LAWFUL ACCESS: AN ANALYSIS OF THE ALTERNATIVES OFFERED IN THE ENCRYPTION DEBATE
Mack, William R. (Monterey, CA; Naval Postgraduate School, 2020-09);This thesis examines the lawful access challenge that law enforcement and intelligence agencies face when seeking to obtain communications and mobile electronic devices that cannot be penetrated and that include strong ...