Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Question 5: Using a Web browser, perform some research on syslog. Based on your

ID: 3912340 • Letter: Q

Question

Question 5: Using a Web browser, perform some research on syslog. Based on
your research results, explain what syslog is. Then continue to research one
compliance practice that you or your company has used, and discuss more
details about it. Provide URLs of any references you use. (10 points)

Question 5: Using a Web browser, perform some research on syslog. Based on
your research results, explain what syslog is. Then continue to research one
compliance practice that you or your company has used, and discuss more
details about it. Provide URLs of any references you use. (10 points)

Question 5: Using a Web browser, perform some research on syslog. Based on
your research results, explain what syslog is. Then continue to research one
compliance practice that you or your company has used, and discuss more
details about it. Provide URLs of any references you use. (10 points)

Explanation / Answer

Answer)

Syslog is the method of devices connected to the network to send the events messages to the server whose prime motive is logging that information, this server used for logging in known as syslog server. In the syslog server protocol, many devices are connected to the network and thus can be used to gather log data of all the devices and events that are happening in the network. Routers, switches, firewalls, printers and web servers and many more such can be used to generate the Syslog data and store it in the syslog server. Syslog contains some of the components which are :

Syslog listener - This component performs listening to receive the messages over the server by the syslog server.

Database - The database is used to store the syslog data by the syslog server to store huge amount of syslog data.

Managing and Filtering - Because of huge amount of data managing and filtering of the data is needed, thus a specific software or technique is used to filter and view important data from the syslog.

The compliance practices used by companies is one to protect the syslog data, as in the wrong hands control of the syslog server, database or data can be very bad. Thus the company protects through compliance the syslog data in non-human readable format or being encrypted in the database. This maintains the security of the syslogs. Storage of basic and also detailed information in many cases are necessary depending upon the gravity of the events as per compliance such as: ip address, timestamp, log message, what triggered the even etc.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote