What are considered best practices for log management


Problem

1. Using a Web browser, perform some research on a newer malware variant that has been reported by a major malware containment vendor. Using a search engine, go to the vendor's Web site; this could be Symantec, McAfee, or any of their competitors. Visit one malware prevention software vendor. Search for the newest malware variants and pick one. Note its name and try to understand how it works. Now look for information about that same malware from at least one other vendor. Were you able to see this malware at both vendors? If so, are there any differences in how they are reported between the two vendors?

2. Log management and log analysis are techniques used to collect and report on what's happening on a network. Visit the log management community's Web site. This site is devoted to log management tools and the techniques to use the tools. Click the Compliance tab and read the material found there for more information about what are considered best practices for log management.

3. Depending on copyright, the documentary "The KGB, the Computer and Me" may be available for viewing on public video-streaming services. Use a search engine to search for the title, and watch it if it is available. (The video remains available as of 2012. It runs about 57 minutes.)

The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.

Solution Preview :

Prepared by a verified Expert
Management Information Sys: What are considered best practices for log management
Reference No:- TGS02985716

Now Priced at $15 (50% Discount)

Recommended (94%)

Rated (4.6/5)

2015 ┬ęTutorsGlobe All rights reserved. TutorsGlobe Rated 4.8/5 based on 34139 reviews.