IT286_Unit_2_Lab.docx(1) 1 Unit 2 Lab IT286 Unit 2 Lab: Purdue University Global IT
- From Economics, General Economics
- Termpaper
- Rating : 3
- Grade : B
- Questions : 0
- Solutions : 15269
- Blog : 0
- Earned : $2452.10
IT286_Unit_2_Lab.docx(1) 1 Unit 2 Lab IT286 Unit 2 Lab: Purdue University Global IT286- Network Security Concepts Screen shot showing 6.9.10 Screen shot showing 6.10.4 Screen shot showing 7.8.8 Screen shot showing 7.9.7 Part 2 A log is a record of the events occurring within an organizations system and networks. Logs are composed of log entries; each entry contains information related to a specific event that has occurred within a system or network (Kent, 2006). Many logs within an organization contain records related to computer security. These computer security logs are generated by many sources including security software like antivirus software, firewalls, and intrusion detection and prevention systems as well as operating systems on servers, workstations, networking equipment, and applications (Kent, 2006). Creating a logging Policy for your company is very important. Some examples of equipment and devices you want to include on your security log are servers, computers, firewalls, switches and routers. You want to create a logging policy so it will keep track of critical systems. You want to make sure users who are logged in are allowed and you want to know what they logged into in case you need to troubleshoot problems. You need to manage your system and protect against unauthorized access to your system. A logging policy also prevents and detects if an employee is committing legal activity. Systems logging Policy shall be as follows ï‚· Record System administrator activit
[Solved] IT286_Unit_2_Lab.docx(1) 1 Unit 2 Lab IT286 Unit 2 Lab: Purdue University Global IT
- This solution is not purchased yet.
- Submitted On 22 Sep, 2022 01:48:55
- Termpaper
- Rating : 3
- Grade : B
- Questions : 0
- Solutions : 15269
- Blog : 0
- Earned : $2452.10