Data Security in Local Network using Distributed Firewalls
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science crazy
Super Moderator
******

Posts: 3,048
Joined: Dec 2008
#1
17-09-2009, 01:07 AM


Data Security in Local Network using Distributed Firewalls

Distributed firewalls are host-resident security software applications that protect the enterprise network s servers and end-user machines against unwanted intrusion. They offer the advantage of filtering traffic from both the Internet and the internal network. This enables them to prevent hacking attacks that originate from both the Internet and the internal network. This is important because the most costly and destructive attacks still originate from within the organization.

They are like personal firewalls except they offer several important advantages like central management, logging, and in some cases, access-control granularity. These features are necessary to implement corporate security policies in larger enterprises. Policies can be defined and pushed out on an enterprise-wide basis.
A feature of distributed firewalls is centralized management. The ability to populate servers and end-users machines, to configure and push out consistent security policies helps to maximize limited resources. The ability to gather reports and maintain updates centrally makes distributed security practical. Distributed firewalls help in two ways. Remote end-user machines can be secured . Secondly, they secure critical servers on the network preventing intrusion by malicious code and jailing other such code by not letting the protected server be used as a launch pad for expanded attacks.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  elastic optical network wiki jaseelati 0 262 22-01-2015, 02:07 PM
Last Post: jaseelati
  distributed power flow controller ppt jaseelati 0 267 21-01-2015, 03:21 PM
Last Post: jaseelati
  network intrusion detection system project report doc jaseelati 0 366 13-01-2015, 01:15 PM
Last Post: jaseelati
  wireless power theft monitoring system and indication at local substations. jaseelati 0 356 10-01-2015, 03:42 PM
Last Post: jaseelati
  orange data mining tool ppt jaseelati 0 175 07-01-2015, 01:58 PM
Last Post: jaseelati
  laser security system wikipedia jaseelati 0 970 01-01-2015, 04:22 PM
Last Post: jaseelati
  air force security using thumb checker jaseelati 0 331 27-12-2014, 04:01 PM
Last Post: jaseelati
  security using colors and armstrong numbers ppt jaseelati 0 256 27-12-2014, 03:33 PM
Last Post: jaseelati
  network intrusion detection system project report jaseelati 0 245 23-12-2014, 03:08 PM
Last Post: jaseelati
  the client/server network strategy can handle very large networks efficiently. jaseelati 0 266 11-12-2014, 02:17 PM
Last Post: jaseelati