Topic (Virtual Private Network)

1. History and development of the internet + (Intro into the purpose of the paper) – i.e touch briefly on the educational benefits.

1.1 LAN

1.2 PAN

1.3 WAN

1.4 IEEE 802.11

1” margins, double-spaced
12-point Times New Roman font
APA formatting for the entire paper (not just references)
OVERALL PAPER INFORMATION

Research Project Proposal

Topic (Virtual Private Network)

1) Introduce 1~2 important news articles about your research topic. Please provide a summary of the article.

https://www.spiceworks.com/collaboration/remote-support/guest-article/how-to-improve-your-vpn-speeds/

https://www.torproject.org/

https://cybernews.com/privacy/what-is-tor-and-how-does-it-work/

https://nordvpn.com/blog/sniffing-attack/

https://www.crowdstrike.com/cybersecurity-101/zero-trust-security/

https://www.byos.io/blog/the-problem-with-vpns

This article touches on some of the problems with VPNs. This article addresses several methods malicious attackers can utilize to exploit VPNs and take hold of private information. For example, attackers can attack devices on a network by using a method known as pivoting, which allows them to bypass security measures such as firewalls. Although there are benefits to using a VPN service, research should be done into the service one plans to utilize.

https://www.zdnet.com/article/this-vpn-service-used-by-ransomware-gangs-was-just-taken-down-by-police/
This article showcases how underground VPNs can be a gateway for malicious attackers. These VPN providers can have access to private information from users which can often lead to detrimental consequences when fallen into the wrong hands. It’s always important to check the company’s privacy policies again before registering for the service. If the service provider doesn’t make this obvious right away, you might need to look at reviews for an answer. Sometimes a cheap VPN is preferred over a free VPN that won’t provide adequate security. Ultimately the company one ops to utilize should be reviewed.

2) Provide 1~2 reasons why you think this topic is important.

Although VPNs are frequently used to protect against hackers and snoopers on public networks, when used efficiently, they can also be helpful for concealing your IP address, browsing history, and other personal information on any Wi-Fi network, including at home.

VPNs can potentially expose entire networks to threats like distributed denial-of-service (DDoS), sniffing, and spoofing attacks.

3) Address 2~3 possible research goals (e.g., This research project will introduce the strengths and weaknesses of various biometric methods.)

How to strengthen the connection while connected to a VPN.

How to increase the protection of the VPN Process – utilizing apps or platforms with end-to-end encryption. (“The next step up” in terms of anonymity → “Tor” – Although it provides a means for greater anonymity, the connection is slow)

4)Provide 2~3 expected educational benefits for audiences.

Learning their ability to access resources anonymously, especially in regions where these resources can be restricted.
Provides a pathway for people to use to remotely transfer data between users. VPNs allow users to send encrypted data via private servers to prevent information from being leaked to unauthorized users.
It’s crucial to maintain reasonable expectations for your online activity even while you look for the best privacy protection options. It is important to be particular when it comes to the use of VPN services. Adequate research into the service should always be done despite advertisements.

Group (5) Draft Outline
Group members: Elijah Austin-Clarke, Sheena Belton – Sections 1.0-1.4, Jaden Pierre – Sections 2.0-2.3.1, Jimmy Aguilar, Marcus Arne Sections – 3.0- 3.1.3.2, Zachary Steinmetz
Topic (Virtual Private Network)

1. History and development of the internet + (Intro into purpose of the paper) – i.e touch briefly on the educational benefits.

1.1 LAN

1.2 PAN

1.3 WAN

1.4 IEEE 802.11

1.5 TCP/IP Protocol

2. History and development of VPNs

2.1 Point-to-Point Tunneling Protocol (PPTP)

2.2 User Datagram Protocol (UDP) *UDP control vs TCP control comparison*

2.2.1 Pivoting (endpoint)

2.3.0 Sniffing (endpoint)

2.3.1 Zombie Networks (reference case involving Zombie Botnet)

3. Choosing the most reliable service (really depends on the user’s needs, emailing, gaming, web surfing, etc…)

3.1 Server Location

3.1.1 VPN Protocols (OpenVPN protocol, etc…)

3.1.2 Wired vs Wireless

3.2.1 End-to-End Encryption

4. Applications and Adoption

4.1 Filtering (Parental Control Filtering, etc..)

4.2 The Tor System (even with the Tor system utilizing a different system which gives more anonymity, it however provides a slower service)

4.3 Future of VPNs (VPN use within the workforce, etc…) + Summary


    Make your order right away

    Confidentiality and privacy guaranteed

    satisfaction guaranteed