Professional Documents
Culture Documents
BELAGAVI
GOVERNMENT ENGINEERING COLLEGE , MOSALEHOSAHALLI
3. Advantages
4. Disadvantages
5. Literature
survey
6 Technology
7. Applications
Introduction
The aim of data security in a local network is to protect sensitive information and
ensure the confidentiality, integrity, and availability of data within that network.
Here's a breakdown of the key objectives:
SCOPE
Data security within the local network scope involves a comprehensive strategy
to safeguard data from unauthorized access, misuse, alteration, or destruction.
This encompasses various practices, technologies, and policies aimed at
protecting sensitive information as it moves across the local network or resides
on devices connected to it.
ADVANTAGES
2Evolution of Threats: Cyber threats are constantly evolving, with attackers em□ploying
increasingly sophisticated tactics and techniques to bypass security measures. Staying ahead of
emerging threats requires continuous monitoring, updating security controls, and investing in
threat intelligence.
3Performance Impact: Some security measures can impact network and system per□formance. For
example, encryption and real-time scanning for threats can consume signif□icant computational
resources, leading to slower system and network speeds. Balancing security with performance is a
challenge that requires careful planning and optimization.
4User Inconvenience: Strong security measures often come with increased control and restrictions
for users. Requirements such as complex password policies, multi-factor authentication, and
restricted access to certain network.
LITERATURE
SURVEY
1 1980s: The Dawn of Network Security:
Early Networks: Initially, local networks were limited in scope and used primarily by academic and research institutions.
Security was not a major concern, and simple password protection was often deemed sufficient.
(APTs):
As cyber threats became more
sophisticated, APTs emerged,
targeting specific organizations for
espionage or financial gain
Physical Security:
Network Architecture
2 Kumar, V., Jain, A., Barwal, P. N. (2019). Network security and types of attacks
in network. P rocedia Computer Science, 152, 362-367.
4 Sneha Sahare, Mamta Joshi and Manish Gehlot “A survey paper data security in
local networks using distributed firewalls” [International Journal on Computer
Science and Engineering (India); 09 Sep 2012]
6 Ioannidis, S. and Keromytis, A.D., and Bellovin, S.M. and J.M. Smith,
”Implementing a Distributed Firewall”, Proceedings of Computer and
Communications Security (CCS), pp. 190-199, November 2000, Athens, Greece.