Information Technology Security Auditing Paper Outline
Outline must be 100% original work and not plagiarized.
Instructions:
You must submit an outline for the paper topic “Information Technology Security Auditing.” It must include a detailed outline of topics and subtopics, as well as an annotated bibliography. Outline will be used to write an 8-10 page research paper. Attached is an example of how the Paper outline must be.
Submission Instructions:
The annotated bibliography must include at least three of the references you will use in your paper, written in APA style.
VPN Security Vulnerabilities Exposed
Thesis Statement: Virtual Private Networks (VPNs) gained popularity as the primary source to securing remote access; however, some vulnerabilities were discovered. These vulnerabilities may allow a hacker to control the attacked system.
I. Introduction
A. Describe what VPNs are, how they are used over the internet.
B. Thesis: Virtual Private Networks (VPNs) gained popularity as the primary source to securing remote access; however, some vulnerabilities were discovered. These vulnerabilities may allow a hacker to control the attacked system
II. Background
A. State when the VPNs were discovered and put into use.
B. Briefly describe one case where VPNs were used and what the outcome was.
C. Discuss the importance of using VPNs in the case discussed in (B).
III. Arguments for benefits of using a Virtual Private Network:
A. VPNs are used to encrypt data (Osborn, 2020)
B. Secures your location.
C. VPN is created to make you anonymous on the internet. Your identity will remain a secret and will not be exposed (PureVPN, 2020)
IV. Arguments for vulnerabilities of VPN security:
A. VPN fingerprinting (Hridyesh, 2020)
B. Insecure storage of authentication credentials by VPN clients (Hills, 2005)
C. Offline password cracking (Hridyesh, 2020)
D. Man-in-the-middle attacks (Frahim & Huang, 2008).
E. Lack of account lockout
F. Poor default configurations
G. Poor guidance and documentation (Hills, 2005)
V. Describe general VPN security consideration
VI. Explain what features should be considered while choosing VPNs
VII. Conclusion
A. Thesis
B. Explain briefly issues leading to vulnerability of VPN security.
C. Describe briefly how your paper has explained the vulnerabilities of VPN security and recommendations.