+1443 776-2705 panelessays@gmail.com

Outline must be 100% original work and not plagiarized.  

Instructions:

You must submit an outline for the paper topic “Information Technology Security Auditing.” It must include a detailed outline of topics and subtopics, as well as an annotated bibliography. Outline will be used to write an 8-10 page research paper. Attached is an example of how the Paper outline must be.

Submission Instructions:

The annotated bibliography must include at least three of the references you will use in your paper, written in APA style.

Running head: RESEARCH PAPER OUTLINE 1

RESEARCH PAPER OUTLINE 4

VPN Security Vulnerabilities Exposed



Thesis Statement: Virtual Private Networks (VPNs) gained popularity as the primary source to securing remote access; however, some vulnerabilities were discovered. These vulnerabilities may allow a hacker to control the attacked system.

I. Introduction

A. Describe what VPNs are, how they are used over the internet.

B. Thesis: Virtual Private Networks (VPNs) gained popularity as the primary source to securing remote access; however, some vulnerabilities were discovered. These vulnerabilities may allow a hacker to control the attacked system

II. Background

A. State when the VPNs were discovered and put into use.

B. Briefly describe one case where VPNs were used and what the outcome was.

C. Discuss the importance of using VPNs in the case discussed in (B).

III. Arguments for benefits of using a Virtual Private Network:

A. VPNs are used to encrypt data (Osborn, 2020)

B. Secures your location.

C. VPN is created to make you anonymous on the internet. Your identity will remain a secret and will not be exposed (PureVPN, 2020)

IV. Arguments for vulnerabilities of VPN security:

A. VPN fingerprinting (Hridyesh, 2020)

B. Insecure storage of authentication credentials by VPN clients (Hills, 2005)

C. Offline password cracking (Hridyesh, 2020)

D. Man-in-the-middle attacks (Frahim & Huang, 2008).

E. Lack of account lockout

F. Poor default configurations

G. Poor guidance and documentation (Hills, 2005)

V. Describe general VPN security consideration

VI. Explain what features should be considered while choosing VPNs

VII. Conclusion

A. Thesis

B. Explain briefly issues leading to vulnerability of VPN security.

C. Describe briefly how your paper has explained the vulnerabilities of VPN security and recommendations.

References

Frahim, & Huang. (2020). VPN security vulnerabilities – 2283 words | Research paper example. Retrieved from https://ivypanda.com/essays/vpn-security-vulnerabilities/

Hills, R. (2005). Common VPN Security Flaws. Retrieved from https://doc.lagout.org/network/Common%20VPN%20Security%20Flaws.pdf

Hridyesh. (2020). Looking ahead: A brief guide to VPN security & vulnerabilities. Retrieved from https://blog.securelayer7.net/guide-to-vpn-security-vulnerabilities/

Osborn, J. (2020). 7 benefits of using a VPN (Virtual private network). Retrieved from https://manofmany.com/lifestyle/advice/benefits-of-using-a-vpn-virtual-private-network

VPN, P. (2020). Top 10 Advantages and Benefits of VPN. Retrieved from https://www.purevpn.com/blog/advantages-benefits-of-vpn/