Summary IT286 Unit 2 Lab.docx 1 Unit 2 Lab IT286 Unit 2 Lab: Purdue University Global IT286- Network Security Concepts Screen shot showing 6.9.10 Screen shot showing 6.10.4 Screen shot showing 7.8.8 Screen shot showing 7.9.7 Part 2 A log is a record
IT286 Unit 2 L 1 Unit 2 Lab IT286 Unit 2 Lab: Purdue University Global IT286- Network Security Concepts Screen shot showing 6.9.10 Screen shot showing 6.10.4 Screen shot showing 7.8.8 Screen shot showing 7.9.7 Part 2 A log is a record of the events occurring within an organization ™s system and networks. Logs are composed of log entries; each entry contains information related to a specific event that has occurred within a system or network (Kent, 2006). Many logs within an organization contain records related to computer security. These computer security logs are generated by many sources including security software like antivirus software, firewalls, and intrusion detection and prevention systems as well as operating systems on servers, workstations, networking equipment, and applications (Kent, 2006). Creating a logging Policy for your company is very important. Some examples of equi
Written for
- Institution
-
Purdue University
Document information
- Uploaded on
- April 8, 2021
- Number of pages
- 5
- Written in
- 2020/2021
- Type
- SUMMARY
Subjects
-
it286 unit 2 labdocx 1 unit 2 lab it286 unit 2 lab purdue university global it286 network security concepts screen shot showing 6910 screen shot showing 6104 screen shot showing 78