INTRODUCTION
CHAPTER 1 THEORETICAL FOUNDATIONS OF SECURITY AND INFORMATION PROTECTION IN COMPUTER NETWORKS
1. Problems and features of information security in computer networks
2. Threats, attacks and channels of information leakage
3. Classification of methods and means of ensuring security
CHAPTER 2 ANALYSIS OF VPN TECHNOLOGY AND ITS EXPLORATION
2.1 Concept and classification of VPN networks, their construction
2.2 Overlay model and its features
2.3 Peer Model, its advantages and implementation difficulties
CHAPTER 3
CONCLUSION