Week 10 discussion SEC 435

User Generated

Fhyyl101k

Computer Science

Description

  • Discuss three (3) methods of safe computing to help in the prevention of Virus and Trojan attacks.  Present the basic technical knowledge that a layman would need in order to use the methods you identified.
  • Explain the exact steps you would take when securing log data. Contrast log generation / management in Windows (i.e. XP, Windows7, Server2008) versus Linux (i.e. Redhat, Ubuntu, Fedora).

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer


Anonymous
I use Studypool every time I need help studying, and it never disappoints.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags