You are on page 1of 13

VISVESVARAYA TECHNOLOGICAL UNIVERSITY

BELAGAVI
GOVERNMENT ENGINEERING COLLEGE , MOSALEHOSAHALLI

Seminar synopsis Presentation on


“DATA SECURITY IN LOCAL
NETWORK”
Department of computer science and
engineering
Presented by
Ayesha Siddiqa D 4HG21CS402

Miss. Sayeda Under the Guidance Dr. K.C.


Fathima Ravishankar
DATA SECURITY IN LOCAL NETWORK
Table of
content
1. Introduction

2. Aim and scope

3. Advantages

4. Disadvantages

5. Literature
survey

6 Technology

7. Applications
Introduction

Now a day’s no one would think a life without computers


and the Internet, they both are become inseparable.
Lots of data are getting transferred through it; one can
connect any computer in the world to any other
computer located apart from each other.

This is a great advantage for individual and corporate as


well. But in this case, one should need the secure
transmission of the data, by the concept of Network
Security, which involves the corrective action taken to
Ease of Use protect from the viruses, hacking and
unauthorized access of the data.
AIM AND
SCOPE
AIM

The aim of data security in a local network is to protect sensitive information and
ensure the confidentiality, integrity, and availability of data within that network.
Here's a breakdown of the key objectives:

SCOPE

Data security within the local network scope involves a comprehensive strategy
to safeguard data from unauthorized access, misuse, alteration, or destruction.
This encompasses various practices, technologies, and policies aimed at
protecting sensitive information as it moves across the local network or resides
on devices connected to it.
ADVANTAGES

Protection Against Data Breaches

Confidentiality: Ensures sensitive information is accessible only to


authorized personel, protecting it from unauthorized access and breaches.
Integrity: Safeguards data accuracy and completeness by
preventing unauthorized data modification.
Availability: Ensures that data and network resources are available to
authorized users when needed.
Improved Productivity: Cyberattacks and data breaches can lead to downtime,
during which employees are unable to perform their tasks effectively. By
securing the network, organizations minimize the risk of disruptions, thereby
improving overall productivity.
DISADVANTAGES
1Complexity: Security solutions often add complexity to network infrastructure, making it more
challenging to configure and manage. Complex security measures may also introduce compatibility
issues with existing systems and applications, requiring careful planning and testing.

2Evolution of Threats: Cyber threats are constantly evolving, with attackers em□ploying
increasingly sophisticated tactics and techniques to bypass security measures. Staying ahead of
emerging threats requires continuous monitoring, updating security controls, and investing in
threat intelligence.

3Performance Impact: Some security measures can impact network and system per□formance. For
example, encryption and real-time scanning for threats can consume signif□icant computational
resources, leading to slower system and network speeds. Balancing security with performance is a
challenge that requires careful planning and optimization.

4User Inconvenience: Strong security measures often come with increased control and restrictions
for users. Requirements such as complex password policies, multi-factor authentication, and
restricted access to certain network.
LITERATURE
SURVEY
1 1980s: The Dawn of Network Security:

Early Networks: Initially, local networks were limited in scope and used primarily by academic and research institutions.
Security was not a major concern, and simple password protection was often deemed sufficient.

2 2000s: The Rise of Advanced

Threats: Advanced Persistent Threats

(APTs):
As cyber threats became more
sophisticated, APTs emerged,
targeting specific organizations for
espionage or financial gain

3 2010s: The Age of Encryption and


Beyond.

End-to-End Encryption: As cyber-


attacks continued to evolve,
TECHNOLOGY

Physical Security:

Network Architecture

Design: Access Controls

Virtual Private Networks


(VPNs)

Network Access Control


(NAC)
APPLICATIONS
1. Enterprise Data 3.Financial Institutions:
Protection
Implement Strong Access
Employee Data: Controls:

Role-based Access Control (RBAC):


Customer

Multi-Factor Authentication (MFA):


Data:
2. Healthcare Systems:

Electronic Health Records

(EHRs): Medical Devices:


CONCLUSIO
N

Concluding a discussion on data security within a local network


requires highlighting several key aspects and considerations essential
to maintaining integrity, confidentiality, and availability of data. Data
security in local networks is critical for organizations of all sizes, as
these networks often contain sensitive, business-critical information.
Here are the main points to consider for ensuring robust data
security in local networks:
BIBLIOGRAP
HY
1 Bellovin, S.M. and W.R. Cheswick,”Firewalls and Internet Security: Repelling
the Wily Hacker”, AddisonWesley, 1994

2 Kumar, V., Jain, A., Barwal, P. N. (2019). Network security and types of attacks
in network. P rocedia Computer Science, 152, 362-367.

3 Prof.V.M.Deshmukh and Rajendra H.Rathod “Roll of distributed firewalls in local


network for data ” Badnera-Amravati, India [International Journal of Computer
Science and Applications Vol. 6, No.2, Apr 2013].

4 Sneha Sahare, Mamta Joshi and Manish Gehlot “A survey paper data security in
local networks using distributed firewalls” [International Journal on Computer
Science and Engineering (India); 09 Sep 2012]

5 Rajendra H. Rathod, V.M. Deshmukh “ Roll of Distributed firewall in local network


for Data Security” International Journal Of Computer Science And Applications
Vol. 6, No.2, April 2013

6 Ioannidis, S. and Keromytis, A.D., and Bellovin, S.M. and J.M. Smith,
”Implementing a Distributed Firewall”, Proceedings of Computer and
Communications Security (CCS), pp. 190-199, November 2000, Athens, Greece.

You might also like