Breaking News

Tuesday, August 25, 2015

ISM unit 3 question bank answers 96-101

QUESTION NUMBER 96-101

96. What is the need for log management? 




97. What are the challenges in log management?




98. Explain the tiers used in a log management infrastructure.

A log management infrastructure typically comprises the following three tiers:


Log Generation.  
The first tier contains the hosts that generate the log data.  Some hosts run logging client applications or services that make their log data available through networks to log servers in the second tier. Other hosts make their logs available through other means, such as allowing the servers to authenticate to them and retrieve copies of the log files.

Log Analysis and Storage.  
The second tier is composed of one or more log servers that receive log data or copies of log data from the hosts in the first tier.  The data is transferred to the servers either in a real-time or near-real-time manner, or in occasional batches based on a schedule or the amount of log data waiting to be transferred.  Servers that receive log data from multiple log generators are sometimes called collectors or aggregators.  Log data may be stored on the log servers themselves or on separate database servers.

Log Monitoring.  
The third tier contains consoles that may be used to monitor and review log data and the results of automated analysis.  Log monitoring consoles can also be used to generate reports.  In some log management infrastructures, consoles can also be used to provide management for the log servers and clients.  Also, console user privileges sometimes can be limited to only the necessary functions and data sources for each user.

The second tier—log analysis and storage—can vary greatly in complexity and structure.  The simplest arrangement is a single log server that handles all log analysis and storage functions. Examples of more complex second tier arrangements are as follows:

  • Multiple log servers that each perform a specialized function, such as one server performing log collection, analysis, and short-term log storage, and another server performing long-term storage.
  • Multiple log servers that each perform analysis and/or storage for certain log generators.  This can also provide some redundancy.  A log generator can switch to a backup log server if its primary log server becomes unavailable.  Also, log servers can be configured to share log data with each other, which also supports redundancy. 
  • Two levels of log servers, with the first level of distributed log servers receiving logs from the log generators and forwarding some or all of the log data they receive to a second level of more centralized log servers.  (Additional tiers can be added to this architecture to make it even more flexible, scalable, and redundant.)  In some cases, the first level servers act as log caching servers—simply receiving logs from log generators and forwarding them to other log servers.  This can be done to protect the second level of log servers from direct attacks, and it is also useful when there are network reliability concerns between the log generators and the second level of log servers, such as those servers being accessible only over the Internet.  In that case, having log caching servers on a reliable local network allows the log generators to transfer their logs to those servers, which can then transfer the logs to the second level of log servers when network connectivity permits.


99. Define roles and responsibilities of the persons involved in log management.




100. List and explain various forms of malware.




101. List and explain the popular types of attacker tools



No comments:

Post a Comment

Designed By Blogger Templates