Discussion and Response to friend post

User Generated

fea6758

Computer Science

Description

Hello, I need help with one Task?

Task :

Discussion: Choose one of the real-world exercises from the attached PDF Week 9 (7-1 through 7-3). Perform the exercises and write the response to that exercise. Your post should be at least 250 words and include at least one citation and reference formatted using APA 6 requirements.

Note : I am attaching the 304 PDF page so that you can refer the exercises questions

Response: You should give response to attached document name (response to my friend post)which is posted by my friend, You need to go through his post and give response to that post. your response must be professional, courteous, substantive, add to the conversation, a minimum of 100 words, and more than a statement of agreeing or accolades.

Note: In your responses to other students, please do not just write responses which are long strings of describing how good they did with their post. A single sentence thanking them for their information is sufficient. Then focus on driving the conversation forward, similar to what you would do if you were speaking to them in person. You would likely ask questions, relate to something you have seen before, or go in to greater depth on what you found in your own readings. Please focus on topics such as 'Why' this information is important for these discussions. Why is having these resources important? Why is it good to know about these vulnerabilities? Why does having this information help IT professionals in security and business continuity?

Final: I need total 2 word documents

1. Discussion Post in 250 words and keep the file name as "Discussion 9".

2. Response to my friend post in 100 to 150 words and keep the file name as "Response to my friend discussion"

Thanks.

one month ago

Unformatted Attachment Preview

My Friend Discussion Post: There is much content that is available in the Syslog management compliance tab. The main function of Syslog is to offer log management to departments that aim to protect and secure data to other organizations. Syslog aims to provide a secure log management service to its customers. Many information technology departments spend a lot of financial and human resources to ensure that their data and their client's data is secure and protected from any form of malware. Syslog comes in as a solution to the departments to help them meet their compliance requirements. However, several challenges are faced in compliance which is discussed; first, there is an overwhelming amount of data that IT departments handle and retaining the data is a challenge and if the data is poorly integrated, there occurs a compliance difficulty. The second problem is that it is challenging to get logs or access them because the clients need to access them from many devices and application which can be tedious. Other information on the website is the importance of Syslog. Syslog makes logs normal, and filters log data for the client which reduces the size and complexity of data that is stored. The Syslog system is tamper-proof transfer and storage of data. This means that during the transfer of data, the information is secure and cannot be assessed by hackers or intrusion malware. The system has granular retention policies which are automatic. Syslog also customizes data preferences for the clients according to their needs. The greatest advantage of Syslog is that it is cost effective. The log management is affordable to many IT clients. Secondly, the log management’s simplicity in retention of logs as well as deleting them makes the system advantageous. Syslog provides better data integrity which is collected and stored securely in one central repository (Bolgert, Kalyanaraman, Forlenza & Cohen, 2015). 10/22/2018 Principles of Incident Response and Disaster Recovery, 2e PRINTED BY: 6de6712f515cd17@placeholder.24190.edu. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted. https://ereader.chegg.com/#/books/9781285712628/cfi/327!/4/4@0.00:10.7 1/1
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

This question has not been answered.

Create a free account to get help with this and any other question!

Similar Content

Related Tags