In a research paper introduce 1~2 important news articles about your research topic. Provide a summary of the article. Provide 1~2 reasons why you think this topic is important.

Topic (Virtual Private Network)

Research Paper:

1) Introduce 1~2 important news articles about your research topic. Provide a summary of the article.

https://www.spiceworks.com/collaboration/remote-support/guest-article/how-to-improve-your-vpn-speeds/

https://www.torproject.org/

https://cybernews.com/privacy/what-is-tor-and-how-does-it-work/

What is a sniffing attack?

 

https://www.crowdstrike.com/cybersecurity-101/zero-trust-security/

https://www.byos.io/blog/the-problem-with-vpns

2) Provide 1~2 reasons why you think this topic is important.

3) Address 2~3 possible research goals (e.g., This research project will introduce the strengths and weaknesses of various biometric methods.)

How to strengthen the connection while connected to a VPN.

How to increase the protection of the VPN Process – utilizing apps or platforms with end-to-end encryption.

4) Provide 2~3 expected educational benefits for audiences.

Group (5) Draft Outline
Group members: Elijah Austin-Clarke, Sheena Belton – Sections 1.0-1.4, Jaden Pierre – Sections 2.0-2.3.1, Jimmy Aguilar, Marcus Arne Sections – 3.0- 3.1.3.2, Zachary Steinmetz
Topic (Virtual Private Network)

1. History and development of the internet + (Intro into purpose of the paper) – i.e touch briefly on the educational benefits.

1.1 LAN

1.2 PAN

1.3 WAN

1.4 IEEE 802.11

1.5 TCP/IP Protocol

2. History and development of VPNs

2.1 Point-to-Point Tunneling Protocol (PPTP)

2.2 User Datagram Protocol (UDP) *UDP control vs TCP control comparison*

2.2.1 Pivoting (endpoint)

2.3.0 Sniffing (endpoint)

2.3.1 Zombie Networks (reference case involving Zombie Botnet)

3. Choosing the most reliable service (really depends on the user’s needs, emailing, gaming, web surfing, etc…)

3.1 Server Location

3.1.1 VPN Protocols (OpenVPN protocol, etc…)

3.1.2 Wired vs Wireless

3.2.1 End-to-End Encryption

4. Applications and Adoption

4.1 Filtering (Parental Control Filtering, etc..)

4.2 The Tor System (even with the Tor system utilizing a different system which gives more anonymity, it however provides a slower service)

4.3 Future of VPNs (VPN use within the workforce, etc…) + Summary

In a research paper introduce 1~2 important news articles about your research topic. Provide a summary of the article. Provide 1~2 reasons why you think this topic is important.
Scroll to top