Identify what files would be monitored in your system to identify irregularities in your server

computer science

Description

Identify what files would be monitored in your system to identify irregularities in your server. Then create a list of Log files you feel would be changed in case of breech or network attack. In a one page paper detail explain why you feel it is important for detection.  Then create cron jobs to trigger warnings for irregularities in these files. If a security breech was attempted or succeed your system should alert you to the activity. Provide Screen Shots showing the cron jobs running on the system and a copy of cron scripting you did in a word document. 


Related Questions in computer science category


Disclaimer
The ready solutions purchased from Library are already used solutions. Please do not submit them directly as it may lead to plagiarism. Once paid, the solution file download link will be sent to your provided email. Please either use them for learning purpose or re-write them in your own language. In case if you haven't get the email, do let us know via chat support.