Powered by OpenAIRE graph
Found an issue? Give us feedback
ZENODOarrow_drop_down
ZENODO
Other literature type . 2026
License: CC BY
Data sources: Datacite
ZENODO
Other literature type . 2026
License: CC BY
Data sources: Datacite
versions View all 2 versions
addClaim

METHODS AND TOOLS FOR ENSURING THE SECURITY OF DEVICES AND STORED INFORMATION IN A LOCAL AREA NETWORK

Authors: Jumayeva, Nafisa; Ahmedov, Yusuf; Elomonov, Musurmonbek;

METHODS AND TOOLS FOR ENSURING THE SECURITY OF DEVICES AND STORED INFORMATION IN A LOCAL AREA NETWORK

Abstract

Information security has become one of the most critical issues in modern information technology systems. With the rapid development of computer networks, especially local area networks (LANs), the protection of devices and the information stored on them has become increasingly important. Educational institutions, business organizations, and government agencies rely heavily on LAN infrastructures to store, process, and transmit sensitive information. However, these networks are vulnerable to various security threats such as unauthorized access, malware, data leakage, and internal misuse. The purpose of this article is to analyze the main methods and tools used to ensure the security of devices and stored information within a local area network. The study examines both technical and organizational security mechanisms, including authentication systems, encryption technologies, firewall protection, antivirus software, network monitoring systems, and access control policies. The results show that effective LAN security requires a combination of multiple protective mechanisms rather than reliance on a single method. The integration of modern security technologies with proper network management and user awareness can significantly reduce risks associated with cyber threats. The article concludes that developing a comprehensive security strategy is essential for maintaining confidentiality, integrity, and availability of information within LAN environments. 

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Upload OA version
Are you the author of this publication? Upload your Open Access version to Zenodo!
It’s fast and easy, just two clicks!