Provide 1~2 reasons why you think this topic is important.Provide 2~3 expected educational benefits for audiences.

THE INTRODUCTION PAGE MUST BE 1 FULL PAGE. – clear overview of the paper and its purpose

1. History and development of the internet + (Intro into the purpose of the paper) – i.e touch briefly on the educational benefits.

1.1 LAN

1.2 PAN

1.3 WAN

1.4 IEEE 802.11

1” margins, double-spaced
12-point Times New Roman font
APA formatting for the entire paper (not just references)
OVERALL PAPER INFORMATION

Research Project Proposal

Topic (Virtual Private Network)

1) Introduce 1~2 important news articles about your research topic.  provide a summary of the article.

https://www.spiceworks.com/collaboration/remote-support/guest-article/how-to-improve-your-vpn-speeds/

https://www.torproject.org/

https://cybernews.com/privacy/what-is-tor-and-how-does-it-work/

What is a sniffing attack?

https://www.crowdstrike.com/cybersecurity-101/zero-trust-security/

https://www.byos.io/blog/the-problem-with-vpns

This article touches on some of the problems with VPNs. This article addresses several methods malicious attackers can utilize to exploit VPNs and take hold of private information. For example, attackers can attack devices on a network by using a method known as pivoting, which allows them to bypass security measures such as firewalls. Although there are benefits to using a VPN service, research should be done into the service one plans to utilize.

https://www.zdnet.com/article/this-vpn-service-used-by-ransomware-gangs-was-just-taken-down-by-police/
This article showcases how underground VPNs can be a gateway for malicious attackers. These VPN providers can have access to private information from users which can often lead to detrimental consequences when fallen into the wrong hands. It’s always important to check the company’s privacy policies again before registering for the service. If the service provider doesn’t make this obvious right away, you might need to look at reviews for an answer. Sometimes a cheap VPN is preferred over a free VPN that won’t provide adequate security. Ultimately the company one ops to utilize should be reviewed.

2) Provide 1~2 reasons why you think this topic is important.

Although VPNs are frequently used to protect against hackers and snoopers on public networks, when used efficiently, they can also be helpful for concealing your IP address, browsing history, and other personal information on any Wi-Fi network, including at home.

VPNs can potentially expose entire networks to threats like distributed denial-of-service (DDoS), sniffing, and spoofing attacks.

3) Address 2~3 possible research goals

How to strengthen the connection while connected to a VPN.

How to increase the protection of the VPN Process – utilizing apps or platforms with end-to-end encryption.

4)  Provide 2~3 expected educational benefits for audiences.

Learning their ability to access resources anonymously, especially in regions where these resources can be restricted.
Provides a pathway for people to use to remotely transfer data between users. VPNs allow users to send encrypted data via private servers to prevent information from being leaked to unauthorized users.
It’s crucial to maintain reasonable expectations for your online activity even while you look for the best privacy protection options. It is important to be particular when it comes to the use of VPN services. Adequate research into the service should always be done despite advertisements.

Group (5) Draft Outline
Group members: Elijah Austin-Clarke, Sheena Belton – Sections 1.0-1.4, Jaden Pierre – Sections 2.0-2.3.1, Jimmy Aguilar, Marcus Arne Sections – 3.0- 3.1.3.2, Zachary Steinmetz
Topic

1. History and development of the internet +  – i.e touch briefly on the educational benefits.

1.1 LAN

1.2 PAN

1.3 WAN

1.4 IEEE 802.11

1.5 TCP/IP Protocol

2. History and development of VPNs

2.1 Point-to-Point Tunneling Protocol (PPTP)

2.2 User Datagram Protocol (UDP) *UDP control vs TCP control comparison*

2.2.1 Pivoting (endpoint)

2.3.0 Sniffing (endpoint)

2.3.1 Zombie Networks

3. Choosing the most reliable service

3.1 Server Location

3.1.1 VPN Protocols

3.1.2 Wired vs Wireless

3.2.1 End-to-End Encryption

4. Applications and Adoption

4.1 Filtering

4.2 The Tor System

4.3 Future of VPNs + Summary

© 2020 EssayQuoll.com. All Rights Reserved. | Disclaimer: For assistance purposes only. These custom papers should be used with proper reference.