(pp. 492-498). IEEE.
VerifiedAdded on 2019/10/18
|46
|13398
|223
Report
AI Summary
The provided content discusses various aspects of disaster recovery, including its cost to India ($10 billion per year), fault detection and prediction for computer networks, router attacks and their defense mechanisms, and security measures such as Secure Shell (SSH). The assignment also includes a questionnaire that aims to assess the respondents' awareness and experiences with disaster recovery sites, cloud-based syslog management, and other related topics. The content highlights the importance of disaster recovery planning and preparedness in mitigating the impact of natural and man-made disasters on businesses.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
KINGSTON UNIVERSITY
FACULTY OF ENGINEERING AND COMPUTING
School of Computing
MSc. DEGREE
IN
<State your specialization >
Name: <Student Name>
ID Number: <Student ID>
Project Title: Highly Secured Cloud-Based Syslog Disaster Management
and Disaster Recovery Site with Encrypted Log Data
Supervisor: <Supervisor Name>
Date: <Date of Submission>
FACULTY OF ENGINEERING AND COMPUTING
School of Computing
MSc. DEGREE
IN
<State your specialization >
Name: <Student Name>
ID Number: <Student ID>
Project Title: Highly Secured Cloud-Based Syslog Disaster Management
and Disaster Recovery Site with Encrypted Log Data
Supervisor: <Supervisor Name>
Date: <Date of Submission>
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
WARRANTY STATEMENT
The information provided are well researched and reliable to be considered as true in the real
context.
i
The information provided are well researched and reliable to be considered as true in the real
context.
i
Declaration
I, (name of the student), confirm that the research work on the topic “Highly Secured Cloud-
Based Syslog Disaster Management and Disaster Recovery Site with Encrypted Log Data” has
been solely done by me, and no help was provided to me in regards to the formation of the
objective and the entire idea of the research. Some help was taken from the participants to collect
data and from the university to get the internet connection. The work taken from papers of other
authors has been referenced and has supported by thesis.
24.09.2018 (name of the student)
ii
I, (name of the student), confirm that the research work on the topic “Highly Secured Cloud-
Based Syslog Disaster Management and Disaster Recovery Site with Encrypted Log Data” has
been solely done by me, and no help was provided to me in regards to the formation of the
objective and the entire idea of the research. Some help was taken from the participants to collect
data and from the university to get the internet connection. The work taken from papers of other
authors has been referenced and has supported by thesis.
24.09.2018 (name of the student)
ii
Acknowledgement
The research has been supported successfully by (Name of the University). I thank my teachers
and professors for guiding me with their expertise that helped me in getting a keen insight into
the research, although some of the thoughts implemented in the paper are my own. I thank my
university for providing me with the internet connection and allowing me to carry out the survey
in an effective manner so that the result can be generated. I also put special gratitude to the
participants that participated in the survey and helped me in obtaining a specific outcome of the
research. The entire research was a summative outcome of the help that I received from various
people and departments.
iii
The research has been supported successfully by (Name of the University). I thank my teachers
and professors for guiding me with their expertise that helped me in getting a keen insight into
the research, although some of the thoughts implemented in the paper are my own. I thank my
university for providing me with the internet connection and allowing me to carry out the survey
in an effective manner so that the result can be generated. I also put special gratitude to the
participants that participated in the survey and helped me in obtaining a specific outcome of the
research. The entire research was a summative outcome of the help that I received from various
people and departments.
iii
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
iv
Abstract
The aim of the paper was to analyze the effectiveness and use of cloud-based syslog disaster
management and disaster recovery site from all the disaster recovery sites that are present.
Syslog management is stated as the way to manage data and information in the company and
protecting it during disasters. The research followed the qualitative research methodology and
also the primary and secondary methodology for collecting data. Data from both the methods
have been gathered and evaluated in a systematic manner. The result from the findings showed
that cloud-based Syslog management is the most effective disaster recovery site that a company
can use to save its data from disaster, both natural and man-made.
v
The aim of the paper was to analyze the effectiveness and use of cloud-based syslog disaster
management and disaster recovery site from all the disaster recovery sites that are present.
Syslog management is stated as the way to manage data and information in the company and
protecting it during disasters. The research followed the qualitative research methodology and
also the primary and secondary methodology for collecting data. Data from both the methods
have been gathered and evaluated in a systematic manner. The result from the findings showed
that cloud-based Syslog management is the most effective disaster recovery site that a company
can use to save its data from disaster, both natural and man-made.
v
Table of Contents
1.0 Introduction..............................................................................................................................1
1.1 Prolegomena........................................................................................................................1
1.2 Aim and Objectives..............................................................................................................1
1.2.1 Aim.................................................................................................................................1
1.2.2 Objectives........................................................................................................................2
1.3 Background and Motivation.................................................................................................2
1.4 Problem in brief....................................................................................................................3
1.5 Proposed Solution................................................................................................................3
1.6 Structure of the Thesis.........................................................................................................3
1.7 Summary..............................................................................................................................4
2. Literature Review.......................................................................................................................5
2.1 Introduction..........................................................................................................................5
2.2 Syslog Management System and Benefits..........................................................................5
2.3 Practices to be maintained in Log management..................................................................6
2.4 Syslog Management using Cloud-Based Platform..............................................................7
2.4 Disaster Recovery Sites with Encrypted Log.......................................................................8
2.5 Future trends........................................................................................................................8
2.6 Problem definition................................................................................................................9
2.7 Summary..............................................................................................................................9
3. Technology..............................................................................................................................10
3.1 Research Design...............................................................................................................10
3.2 Work Plan...........................................................................................................................10
3.3 Research Approach...........................................................................................................10
3.4 Research Philosophy.........................................................................................................11
3.5 Data collection method......................................................................................................11
3.6 Sampling method and size.................................................................................................12
3.7 Data analysis method........................................................................................................12
3.8 Research Ethics.................................................................................................................12
4. Design......................................................................................................................................13
5. Approach.................................................................................................................................14
6. Implementation........................................................................................................................15
6.1 Module 1 and 2: Primary and Secondary data collection...................................................16
vi
1.0 Introduction..............................................................................................................................1
1.1 Prolegomena........................................................................................................................1
1.2 Aim and Objectives..............................................................................................................1
1.2.1 Aim.................................................................................................................................1
1.2.2 Objectives........................................................................................................................2
1.3 Background and Motivation.................................................................................................2
1.4 Problem in brief....................................................................................................................3
1.5 Proposed Solution................................................................................................................3
1.6 Structure of the Thesis.........................................................................................................3
1.7 Summary..............................................................................................................................4
2. Literature Review.......................................................................................................................5
2.1 Introduction..........................................................................................................................5
2.2 Syslog Management System and Benefits..........................................................................5
2.3 Practices to be maintained in Log management..................................................................6
2.4 Syslog Management using Cloud-Based Platform..............................................................7
2.4 Disaster Recovery Sites with Encrypted Log.......................................................................8
2.5 Future trends........................................................................................................................8
2.6 Problem definition................................................................................................................9
2.7 Summary..............................................................................................................................9
3. Technology..............................................................................................................................10
3.1 Research Design...............................................................................................................10
3.2 Work Plan...........................................................................................................................10
3.3 Research Approach...........................................................................................................10
3.4 Research Philosophy.........................................................................................................11
3.5 Data collection method......................................................................................................11
3.6 Sampling method and size.................................................................................................12
3.7 Data analysis method........................................................................................................12
3.8 Research Ethics.................................................................................................................12
4. Design......................................................................................................................................13
5. Approach.................................................................................................................................14
6. Implementation........................................................................................................................15
6.1 Module 1 and 2: Primary and Secondary data collection...................................................16
vi
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
6.2 Module 3- Findings............................................................................................................16
6.3 Module 4- Evaluation.........................................................................................................23
6.4 Module 5- Conclusion........................................................................................................23
7. Evaluation................................................................................................................................23
8. Conclusion Critical Evaluation and Future Work.....................................................................26
References..................................................................................................................................28
Bibliography.................................................................................................................................32
Appendices..................................................................................................................................33
vii
6.3 Module 4- Evaluation.........................................................................................................23
6.4 Module 5- Conclusion........................................................................................................23
7. Evaluation................................................................................................................................23
8. Conclusion Critical Evaluation and Future Work.....................................................................26
References..................................................................................................................................28
Bibliography.................................................................................................................................32
Appendices..................................................................................................................................33
vii
List of Tables
Table 1- Modules of the paper
viii
Table 1- Modules of the paper
viii
Abbreviations
TCP- transmission control protocol
IT- information technology
DR- disaster recovery
SAAS- software as a service
ix
TCP- transmission control protocol
IT- information technology
DR- disaster recovery
SAAS- software as a service
ix
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
1.0 Introduction
1.1 Prolegomena
Cloud-based syslog disaster management is one of the most recently used systems to recover disaster
affected sites. The importance of cloud-based Syslog management system is increasing over the years due
to an increase in the rate of disaster. Disaster management helps in controlling the lives and property in
the economy that id destroyed by any disaster incident. According to Song et al. (2013), disaster
management includes all kinds of activity that helps in controlling the impacts of a disaster. The rate of
managing the disaster is not easy and involves various crucial processes to be done in a systematic way.
Thus, technology is playing an important role in controlling and managing the after-effects of all kinds of
disaster in a scenario. According to the statistic, the rate of different types of disaster that has increased
drastically as it is seen that the earthquake has increased by 59 percent and more than 40 million is prone
to floods. The rate is increasing from time to time affecting a huge percentage of life and property on
earth. Further, it is seen that about $9.8 billion has been lost due to the various disasters that took place in
the past few years in India (O'Brien et al. 2006). Such a fast increase in disaster and the urgency of
managing the loss that is made from it led to the use of cloud-based syslog disaster management. There
have been various works conducted in this field to see the ability of highly secure cloud-based Syslog
data that can effectively manage disaster and it's after effects.
The thesis has identified the importance of cloud-based syslog disaster management and disaster
recovery sites and the problem of security related to the system as the research problem. Further, the
research proposes a solution to the system such as high-security services and encrypted data usage in the
cloud-based disaster management system while analyzing the role of the syslog system in securing the
data that can be used in managing disaster in future.
1.2 Aim and Objectives
1.2.1 Aim
The aim of the paper forms an integral part of the research as it has offered the researcher to move in a
systematic format with the investigation process. It streamlines the entire area of study in one particular
direction.
The aim of the paper is to critically analyze the role that cloud-based Syslog data storage plays in
managing the disaster sites using encrypted log data. The paper aims at the disaster management while
studying the cloud-based Syslog management system and not for any other purpose.
1
1.1 Prolegomena
Cloud-based syslog disaster management is one of the most recently used systems to recover disaster
affected sites. The importance of cloud-based Syslog management system is increasing over the years due
to an increase in the rate of disaster. Disaster management helps in controlling the lives and property in
the economy that id destroyed by any disaster incident. According to Song et al. (2013), disaster
management includes all kinds of activity that helps in controlling the impacts of a disaster. The rate of
managing the disaster is not easy and involves various crucial processes to be done in a systematic way.
Thus, technology is playing an important role in controlling and managing the after-effects of all kinds of
disaster in a scenario. According to the statistic, the rate of different types of disaster that has increased
drastically as it is seen that the earthquake has increased by 59 percent and more than 40 million is prone
to floods. The rate is increasing from time to time affecting a huge percentage of life and property on
earth. Further, it is seen that about $9.8 billion has been lost due to the various disasters that took place in
the past few years in India (O'Brien et al. 2006). Such a fast increase in disaster and the urgency of
managing the loss that is made from it led to the use of cloud-based syslog disaster management. There
have been various works conducted in this field to see the ability of highly secure cloud-based Syslog
data that can effectively manage disaster and it's after effects.
The thesis has identified the importance of cloud-based syslog disaster management and disaster
recovery sites and the problem of security related to the system as the research problem. Further, the
research proposes a solution to the system such as high-security services and encrypted data usage in the
cloud-based disaster management system while analyzing the role of the syslog system in securing the
data that can be used in managing disaster in future.
1.2 Aim and Objectives
1.2.1 Aim
The aim of the paper forms an integral part of the research as it has offered the researcher to move in a
systematic format with the investigation process. It streamlines the entire area of study in one particular
direction.
The aim of the paper is to critically analyze the role that cloud-based Syslog data storage plays in
managing the disaster sites using encrypted log data. The paper aims at the disaster management while
studying the cloud-based Syslog management system and not for any other purpose.
1
1.2.2 Objectives
The aim of the paper gives way to various research objective on which the entire investigation process
was based on.
The objective of the research breaks the aim of the paper into various parts so that these parts can be
studied separately and intensively. The aim of the paper is:
to analyze the concept of Syslog system
to critically examine the importance that cloud-based technology plays in the syslog system in which
it manages data in an encrypted format
to examine the presence of highly sensitive Syslog data in the area of investigation in the disaster
management sites
to critically analyze the role of cloud-based Syslog data plays in managing the disaster recovery sites
in which data is stored in encrypted format
1.3 Background and Motivation
The research has been based on various facts that have motivated the researcher to conduct research on
this ground. This section describes the motivation that the researcher got in conducting the research in this
area. The increase in disaster over the period is one of the most important criteria and motivation that the
researcher got to choose disaster management by studying the role of cloud-based Syslog (Okmianski
2009). The disaster has been increasing over the years, and the ways in which the affected sites can be
recovered is not easy as there are various challenges that have to be studied and data that needs to be
collected before reaching a disaster-affected site. Data forms an important part of recovering the site from
a disaster because without knowing the data of the company and other information the recovery system
cannot be installed in that place. Data forms an integral part to decide the type of recovery is needed by
the site and to conduct careful planning about it. The risk of the disaster can only be managed with proper
availability and collection of data from the site. The disaster management organization is working day
and night to protect the data. However, the data has to be shared with the management team so that
appropriate planning can be done. Thus, a data management technology is important to manage the data
in a better way (Ray et al. 2013). Cloud-based Syslog system is one of the most recent data management
techniques that have been used in the disaster-affected area. Syslog is a system log that uses the server to
save the data in the form of a log and allows sending a message to a centrally located server. The data is
then shared on the server on a central platform and can be used to manage critical events and disasters.
However, over the time the importance of security for this data has been of utmost concern as security in
cloud system has been questioned many times. Research has been conducted on this field stating that the
system is protected with encryption to prevent any kind of data breach to happen in the system server.
This is because any modification in the data will hamper the disaster management process of the affected
site.
Thus, the emergency scenario of the economy that is being affected by the disaster, the emergency of
managing the disaster-affected sites, the importance of syslog server in managing the data that is used for
the recovery work and others altogether formed the motivation for the research. The research is of utmost
importance for the economy as well as the disaster management team that works their best to control the
loss. This is because the investigation will help in informing the disaster management organization about
2
The aim of the paper gives way to various research objective on which the entire investigation process
was based on.
The objective of the research breaks the aim of the paper into various parts so that these parts can be
studied separately and intensively. The aim of the paper is:
to analyze the concept of Syslog system
to critically examine the importance that cloud-based technology plays in the syslog system in which
it manages data in an encrypted format
to examine the presence of highly sensitive Syslog data in the area of investigation in the disaster
management sites
to critically analyze the role of cloud-based Syslog data plays in managing the disaster recovery sites
in which data is stored in encrypted format
1.3 Background and Motivation
The research has been based on various facts that have motivated the researcher to conduct research on
this ground. This section describes the motivation that the researcher got in conducting the research in this
area. The increase in disaster over the period is one of the most important criteria and motivation that the
researcher got to choose disaster management by studying the role of cloud-based Syslog (Okmianski
2009). The disaster has been increasing over the years, and the ways in which the affected sites can be
recovered is not easy as there are various challenges that have to be studied and data that needs to be
collected before reaching a disaster-affected site. Data forms an important part of recovering the site from
a disaster because without knowing the data of the company and other information the recovery system
cannot be installed in that place. Data forms an integral part to decide the type of recovery is needed by
the site and to conduct careful planning about it. The risk of the disaster can only be managed with proper
availability and collection of data from the site. The disaster management organization is working day
and night to protect the data. However, the data has to be shared with the management team so that
appropriate planning can be done. Thus, a data management technology is important to manage the data
in a better way (Ray et al. 2013). Cloud-based Syslog system is one of the most recent data management
techniques that have been used in the disaster-affected area. Syslog is a system log that uses the server to
save the data in the form of a log and allows sending a message to a centrally located server. The data is
then shared on the server on a central platform and can be used to manage critical events and disasters.
However, over the time the importance of security for this data has been of utmost concern as security in
cloud system has been questioned many times. Research has been conducted on this field stating that the
system is protected with encryption to prevent any kind of data breach to happen in the system server.
This is because any modification in the data will hamper the disaster management process of the affected
site.
Thus, the emergency scenario of the economy that is being affected by the disaster, the emergency of
managing the disaster-affected sites, the importance of syslog server in managing the data that is used for
the recovery work and others altogether formed the motivation for the research. The research is of utmost
importance for the economy as well as the disaster management team that works their best to control the
loss. This is because the investigation will help in informing the disaster management organization about
2
the usefulness of cloud-based Syslog server in which data can be stored and used for critical event
management.
1.4 Problem in brief
The problem of the research is the role of the data that is maintained by cloud-based Syslog server for
managing the disaster-affected sites. Data is a crucial part of disaster management, and it is important to
manage the information so that the loss is managed effectively. Disaster site data is saved in the central
server, and it is important to investigate whether the cloud-based Syslog server helps in protecting the
data in an encrypted version.
1.5 Proposed Solution
The proposed solution to the problem is that the encrypted data is saved and protected in cloud-based
Syslog system with utmost protection and the use of such data is most useful in disaster management
system. This is the outcome of the research that the researcher aimed at from the entire investigation. The
investigation helped in knowing the role that the cloud-based Syslog data play in managing disaster in the
most protected and encrypted way.
1.6 Structure of the Thesis
The structure of the thesis is the most important part of the paper as it outlines the entire research in a
systematic manner. The outline of the research is the structure that the researcher followed to collect
appropriate data and get to the desired outcome of the investigation. The structure of the thesis is divided
into various chapters, each having a purpose. The entire thesis has eight chapters altogether each with a
specific contribution to the entire research process.
Chapter one is the introductory chapter that provides the beginning of the paper. This chapter includes the
problem statement, the motivation to conduct the research on this area, research aim, objectives and the
proposed outline of the entire research.
Chapter two put forward an analysis of past literature based on the area of study. The entire chapter
analyses past literature on Syslog, cloud-based Syslog and its role in disaster management. This gives an
idea about Syslog system and its importance in disaster management.
Chapter three proposes a technology under which the research has been conducted. The chapter discusses
the methodology used to collect data on the area of study that is cloud-based Syslog system in disaster
management.
Chapter four states the design of the proposed technology and shows the design of the solution that will
be presented. The design will be presented in a diagrammatic format so that the link between one
technique to the other is easily understood.
Chapter five states the approach of the problem in which the discussion of the entire technology in
relation to the problem will be stated. The chapter will discuss the way the researcher approached the
entire research according to the proposed methodology to collect appropriate data.
Chapter six shows the implementation status of the modules that is stated in chapter four to show the way
in which the design has been implemented. The section maintains consistency in the entire design
process.
3
management.
1.4 Problem in brief
The problem of the research is the role of the data that is maintained by cloud-based Syslog server for
managing the disaster-affected sites. Data is a crucial part of disaster management, and it is important to
manage the information so that the loss is managed effectively. Disaster site data is saved in the central
server, and it is important to investigate whether the cloud-based Syslog server helps in protecting the
data in an encrypted version.
1.5 Proposed Solution
The proposed solution to the problem is that the encrypted data is saved and protected in cloud-based
Syslog system with utmost protection and the use of such data is most useful in disaster management
system. This is the outcome of the research that the researcher aimed at from the entire investigation. The
investigation helped in knowing the role that the cloud-based Syslog data play in managing disaster in the
most protected and encrypted way.
1.6 Structure of the Thesis
The structure of the thesis is the most important part of the paper as it outlines the entire research in a
systematic manner. The outline of the research is the structure that the researcher followed to collect
appropriate data and get to the desired outcome of the investigation. The structure of the thesis is divided
into various chapters, each having a purpose. The entire thesis has eight chapters altogether each with a
specific contribution to the entire research process.
Chapter one is the introductory chapter that provides the beginning of the paper. This chapter includes the
problem statement, the motivation to conduct the research on this area, research aim, objectives and the
proposed outline of the entire research.
Chapter two put forward an analysis of past literature based on the area of study. The entire chapter
analyses past literature on Syslog, cloud-based Syslog and its role in disaster management. This gives an
idea about Syslog system and its importance in disaster management.
Chapter three proposes a technology under which the research has been conducted. The chapter discusses
the methodology used to collect data on the area of study that is cloud-based Syslog system in disaster
management.
Chapter four states the design of the proposed technology and shows the design of the solution that will
be presented. The design will be presented in a diagrammatic format so that the link between one
technique to the other is easily understood.
Chapter five states the approach of the problem in which the discussion of the entire technology in
relation to the problem will be stated. The chapter will discuss the way the researcher approached the
entire research according to the proposed methodology to collect appropriate data.
Chapter six shows the implementation status of the modules that is stated in chapter four to show the way
in which the design has been implemented. The section maintains consistency in the entire design
process.
3
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Chapter seven is the evaluation chapter in which the collected data from the implementation of the design
is analyzed with the help of the proposed evaluation technique.
Chapter eight is the last chapter stating the conclusion of the research with the outcome of the
investigation. The chapter also discusses any limitations faced and scope for any future research on this
area.
1.7 Summary
The entire section has stated a structure to the entire research that has been conducted on the cloud-based
syslog disaster management with encrypted data. The section has placed the importance of disaster
management in the economy due to a rapid increase in the number of disaster in past few years. Further,
syslog data is one of the best ways to manage the disaster-affected site due to the data management
facility that it provides. The section also clearly stated the motivation of the research that is the
investigation will help in knowing the importance of cloud-based syslog data in managing the disaster.
This is also stated as the research problem that needs to be solved with the thesis. The proposed solution
to the problem is stated to be that cloud-based syslog disaster management is one of the best ways to
manage disaster data and using it in recovering affected sites. Lastly, the section proposed a detailed
outline of the thesis that was used by the researcher to conduct the entire investigation process and to
reach the actual outcome of the research.
2. Literature Review
2.1 Introduction
After the introduction to the research that has been stated in chapter one, the second chapter evaluates the
literature on cloud-based syslog data and its role in disaster management. The entire chapter is divided
into parts that will help in studying past literature in the research area and answer the problem statement
to some extent. The purpose of the chapter is to collect secondary data on this regards and also help the
researcher to formulate the type of technology it will use to collect data. Various past works of literature
have been studied to analyze the entire system of log management and the cloud computing framework.
Further, the benefit it adds to the disaster management process is also reviewed.
2.2 Syslog Management System and Benefits
Syslog management is one of the new systems used by the network manager to manage the information
and data in the network and protected from. The Syslog system is considered as a computing system in
4
is analyzed with the help of the proposed evaluation technique.
Chapter eight is the last chapter stating the conclusion of the research with the outcome of the
investigation. The chapter also discusses any limitations faced and scope for any future research on this
area.
1.7 Summary
The entire section has stated a structure to the entire research that has been conducted on the cloud-based
syslog disaster management with encrypted data. The section has placed the importance of disaster
management in the economy due to a rapid increase in the number of disaster in past few years. Further,
syslog data is one of the best ways to manage the disaster-affected site due to the data management
facility that it provides. The section also clearly stated the motivation of the research that is the
investigation will help in knowing the importance of cloud-based syslog data in managing the disaster.
This is also stated as the research problem that needs to be solved with the thesis. The proposed solution
to the problem is stated to be that cloud-based syslog disaster management is one of the best ways to
manage disaster data and using it in recovering affected sites. Lastly, the section proposed a detailed
outline of the thesis that was used by the researcher to conduct the entire investigation process and to
reach the actual outcome of the research.
2. Literature Review
2.1 Introduction
After the introduction to the research that has been stated in chapter one, the second chapter evaluates the
literature on cloud-based syslog data and its role in disaster management. The entire chapter is divided
into parts that will help in studying past literature in the research area and answer the problem statement
to some extent. The purpose of the chapter is to collect secondary data on this regards and also help the
researcher to formulate the type of technology it will use to collect data. Various past works of literature
have been studied to analyze the entire system of log management and the cloud computing framework.
Further, the benefit it adds to the disaster management process is also reviewed.
2.2 Syslog Management System and Benefits
Syslog management is one of the new systems used by the network manager to manage the information
and data in the network and protected from. The Syslog system is considered as a computing system in
4
which the messages are computed in the network and can be shared easily throughout the logging server.
The Syslog servers, in other words, are also referred to as logging server and are centrally located server
from which the data are transmitted to the network. The Syslog system uses various types of devices
through which it collects log or data related to particular events or incident (Okmianski 2009). The system
of syslog is one of the most recent and easiest methods to collect data on an event. Syslog system or
server manages three activities in the same time in a syslog system such as collecting the log with the help
of software, the system of transferring the log in the desired location and analyzing the log for event
management. These are the three events that have helped network managers to understand the critical log
and manage them in a systematic manner. Further, it is seen that the syslog server saves the log in a
particular format and offers a security code to it so that the collected logs are not modified, as it is critical
to the event. However, the logs that are secured are assigned to different levels of security by the system
designer depending on the critical events and the danger related to it. This is one of the benefits that is
offered by log management to protect it from attackers. In addition to this, the syslog system also helps in
showing any modification or alteration occurring in the server so that they can detect security issue
occurring in that. Thus, the syslog server helps in acquiring the log, securing it and then transferring it to
the required server (Thakur 2015). One of the major activities that take place in the syslog system is that
there is software that helps in using the syslog message to the syslog server. The known server that is
being used is Linus web server and window based server. In the absence of the software, the message or
log is not transferred to the server.
Thottan and Ji (2004) have defined a log that is being recorded by the syslog server as a data that
consists of all kinds of information regarding an event or issue. The log is one of the most important
factors that are considered while solving an issue or recovery from a difficult event. Thus, this makes the
syslog server an important constituent for solving an issue or critically important events. Further, syslog
also helps in improving the difficulties that are involved in managing the logs and has become an
important factor for network admin. This is because the server has helped in making their work easier as
the entire infrastructure of the log is set in one place, and there is no need to interfere with logs in
different system separately. This is because the syslog server is a centre based server from where the log
is transferred from one place to all other parts. Syslog helps in making the work faster because it makes
use of network devices to transfer the log in the management sites. This is possible by the syslog server
because they use TCP to transfer all kinds of messages in a secure way. All these factors have helped the
syslog server to become one of the most important parts in managing critical events as event management
needs valuable information and that can be easily offered by the syslog server over time (Waichal and
Meshram 2013). Depending on these messages the management team helps in putting their plan into
action. Thus syslog messages have become one of the most important factors to be considered by the
management team that manages events.
2.3 Practices to be maintained in Log management
Security information and event management have been stated by Church et al. (2012) to be the system
of collecting data from various networks that help in showing network activity that is being carried out
and analyzing those data in increasing the security and event. The SIEM system helps in analyzing the
data and identifies the attack that has taken place in the network and help in identifying whether the attack
5
The Syslog servers, in other words, are also referred to as logging server and are centrally located server
from which the data are transmitted to the network. The Syslog system uses various types of devices
through which it collects log or data related to particular events or incident (Okmianski 2009). The system
of syslog is one of the most recent and easiest methods to collect data on an event. Syslog system or
server manages three activities in the same time in a syslog system such as collecting the log with the help
of software, the system of transferring the log in the desired location and analyzing the log for event
management. These are the three events that have helped network managers to understand the critical log
and manage them in a systematic manner. Further, it is seen that the syslog server saves the log in a
particular format and offers a security code to it so that the collected logs are not modified, as it is critical
to the event. However, the logs that are secured are assigned to different levels of security by the system
designer depending on the critical events and the danger related to it. This is one of the benefits that is
offered by log management to protect it from attackers. In addition to this, the syslog system also helps in
showing any modification or alteration occurring in the server so that they can detect security issue
occurring in that. Thus, the syslog server helps in acquiring the log, securing it and then transferring it to
the required server (Thakur 2015). One of the major activities that take place in the syslog system is that
there is software that helps in using the syslog message to the syslog server. The known server that is
being used is Linus web server and window based server. In the absence of the software, the message or
log is not transferred to the server.
Thottan and Ji (2004) have defined a log that is being recorded by the syslog server as a data that
consists of all kinds of information regarding an event or issue. The log is one of the most important
factors that are considered while solving an issue or recovery from a difficult event. Thus, this makes the
syslog server an important constituent for solving an issue or critically important events. Further, syslog
also helps in improving the difficulties that are involved in managing the logs and has become an
important factor for network admin. This is because the server has helped in making their work easier as
the entire infrastructure of the log is set in one place, and there is no need to interfere with logs in
different system separately. This is because the syslog server is a centre based server from where the log
is transferred from one place to all other parts. Syslog helps in making the work faster because it makes
use of network devices to transfer the log in the management sites. This is possible by the syslog server
because they use TCP to transfer all kinds of messages in a secure way. All these factors have helped the
syslog server to become one of the most important parts in managing critical events as event management
needs valuable information and that can be easily offered by the syslog server over time (Waichal and
Meshram 2013). Depending on these messages the management team helps in putting their plan into
action. Thus syslog messages have become one of the most important factors to be considered by the
management team that manages events.
2.3 Practices to be maintained in Log management
Security information and event management have been stated by Church et al. (2012) to be the system
of collecting data from various networks that help in showing network activity that is being carried out
and analyzing those data in increasing the security and event. The SIEM system helps in analyzing the
data and identifies the attack that has taken place in the network and help in identifying whether the attack
5
is by a machine or user. The log that is generated is a message that is saved in the form of the log file that
is generated with the help of a network device such as firewalls, servers and other. According to Thottan
and Ji (2004), there are various practices that need to be followed by the organization in deciding on the
model of log management that has to be taken into consideration. The first step is to identify the goals of
the business. This is the major and the most important part of analyzing the model of log management.
The criticality of the situation and the role log play in that helps in deciding type of log management
model. The IT sector would require log for problem solution, whereas the security management team
would require the log for event management. Other than this, there is also possible use of log in
management in marketing, forensics, and others. Thus, depending on the business goals the types of log
management to be used is decided. Further, it is also important to find the appropriate staff that will be
able to use and manages the system that the business will use for managing log. This is because without
knowing the system the logs will not be managed effectively, whether in internal or in a cloud. In addition
to this, it is important to try the solution before putting the solution into action or saving the actual data or
log (Iyer et al. 2017). This can be done with the effort of attacking the log that is highly security
component so that the potential threat and the strength of the security can be checked. These practices
help in understanding the types of log management system that the organization need for managing their
log. Depending on the decision the organization helps in managing the log and getting over the issue that
is being created.
2.4 Syslog Management using Cloud-Based Platform
Cloud computing is considered as a cloud-based platform in which the data is protected in a cloud or
network for future use. Cloud network is one of the most critical systems that use data that can be used
from any location in the world. Thus, a cloud has also formed an important part of the syslog
management system. Cloud is considered the best storage device to manage the logs that can be accessed
from every corner. The cloud storage allows the delivery of the data in the form of a service known as
Xaas and uses three different types of service model such as software as a service, platform as a service
and infrastructure as service. The first service model helps in transferring software as a service and Paas
offers platform as a service and Iaas offers infrastructure such as servers, networks, and storage as a
service (Kelsey, Callas and Clemm 2010). Further, it is seen that there are various models in the
infrastructure of cloud computing and this leads to different security issues. Public cloud is a model which
is the largest cloud computing platform and helps in managing and securing the data on a large scale. A
private cloud, on the other hand, manages the single tenant environment and is less cost-effective.
Further, the community cloud model helps in managing a single community or organizations. Thus, these
are the three models that use the cloud to manage the log at different platforms large or small. The most
important contribution of the cloud design to protect and develop encrypted protocols and also maintain
the confidentiality of the log. However, the open management of log that existed before did not help in
protecting the confidentiality and integrity of the log file storage. Cloud has various processes for
uploading the log in the cloud and also limiting the access. It has been stated by Kolhe and Shaikh (2018)
that upload logging client should authenticate the cloud that they have taken previous authorization from
the cloud. There are various processes to be used while uploading the information in the cloud and that
help in securing the log in a better way. Firstly, the tag needs to be generated while uploading a batch of
6
is generated with the help of a network device such as firewalls, servers and other. According to Thottan
and Ji (2004), there are various practices that need to be followed by the organization in deciding on the
model of log management that has to be taken into consideration. The first step is to identify the goals of
the business. This is the major and the most important part of analyzing the model of log management.
The criticality of the situation and the role log play in that helps in deciding type of log management
model. The IT sector would require log for problem solution, whereas the security management team
would require the log for event management. Other than this, there is also possible use of log in
management in marketing, forensics, and others. Thus, depending on the business goals the types of log
management to be used is decided. Further, it is also important to find the appropriate staff that will be
able to use and manages the system that the business will use for managing log. This is because without
knowing the system the logs will not be managed effectively, whether in internal or in a cloud. In addition
to this, it is important to try the solution before putting the solution into action or saving the actual data or
log (Iyer et al. 2017). This can be done with the effort of attacking the log that is highly security
component so that the potential threat and the strength of the security can be checked. These practices
help in understanding the types of log management system that the organization need for managing their
log. Depending on the decision the organization helps in managing the log and getting over the issue that
is being created.
2.4 Syslog Management using Cloud-Based Platform
Cloud computing is considered as a cloud-based platform in which the data is protected in a cloud or
network for future use. Cloud network is one of the most critical systems that use data that can be used
from any location in the world. Thus, a cloud has also formed an important part of the syslog
management system. Cloud is considered the best storage device to manage the logs that can be accessed
from every corner. The cloud storage allows the delivery of the data in the form of a service known as
Xaas and uses three different types of service model such as software as a service, platform as a service
and infrastructure as service. The first service model helps in transferring software as a service and Paas
offers platform as a service and Iaas offers infrastructure such as servers, networks, and storage as a
service (Kelsey, Callas and Clemm 2010). Further, it is seen that there are various models in the
infrastructure of cloud computing and this leads to different security issues. Public cloud is a model which
is the largest cloud computing platform and helps in managing and securing the data on a large scale. A
private cloud, on the other hand, manages the single tenant environment and is less cost-effective.
Further, the community cloud model helps in managing a single community or organizations. Thus, these
are the three models that use the cloud to manage the log at different platforms large or small. The most
important contribution of the cloud design to protect and develop encrypted protocols and also maintain
the confidentiality of the log. However, the open management of log that existed before did not help in
protecting the confidentiality and integrity of the log file storage. Cloud has various processes for
uploading the log in the cloud and also limiting the access. It has been stated by Kolhe and Shaikh (2018)
that upload logging client should authenticate the cloud that they have taken previous authorization from
the cloud. There are various processes to be used while uploading the information in the cloud and that
help in securing the log in a better way. Firstly, the tag needs to be generated while uploading a batch of
6
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
log records. Secondly, the entity then needs to upload the log data request. Thirdly, the protocol needs to
be used to download the log data from the cloud and send the request message with the name of the tag.
Lastly, the request is sent to delete the message or log, and then the response is sent by the cloud to delete
the tag. This is the process that needs to be followed by log management party in order to upload,
download and delete the log according to their tags in the cloud system.
Angin et al. (2010) have further stated that it is important for the organization to decide on the model
they want to use to manage their log in the cloud. However, it is necessary that they are clear about the
reason they want to collect the log for and the amount of security that needs to be maintained. The first
consideration is to see the type of data that needs to be collected and the event that will be addressed by it.
This will help them to address the fact that whether it is adequate to manage log internally or in the cloud.
This is because the log that needs to be shared by various people or in areas will always use cloud so that
it can be effectively done. Thirdly, the organization needs to test the system before securing the log in any
one of the types of system. The protection that is offered by cloud shows the importance of syslog system
using cloud platform (Lehner, Sattler and Sattler 2013). There are others factors that need to be
considered while adopting cloud platform in log management such as Saas availability, a time limit for
the existence of the log, the time of delivery of the log to the client, maintaining the compliance and
others. By looking at these factors, the management decides to take up Syslog system based on a cloud
platform. Lee et al. (2011) have pointed out that offering encrypted data is one more benefit of log
management using the cloud. Encrypted protocols manage the log in the most protective way so that one
tag is not used by any other clients.
2.4 Disaster Recovery Sites with Encrypted Log
According to Chang (2015), disaster recovery site is termed as a facility that can be used by an
organization to restore its services or infrastructure if there is some threat or security issue has happened
within it. Thereis are intensive planning and cost required to be made by the organization while deciding
the disaster recovery site for themselves. However, broadly two types of disaster management site are
used such as internal and external. Internal sites are set up and maintained by an organization, and the
external site is owned by the outside provider. One of the most important requirements for disaster
recovery is the distance of the organization from it. This is because a closer site helps in better
management of the data and costs less. Whereas, the site that far causes replication and cost a lot to the
company. Thus, the distance of disaster management sites also helps in managing the log in a different
way. Further, along with internal and external disaster recovery sites, there is also the use of a cloud-
based recovery site used by the company (Sahebjamnia, Torabi and Mansouri 2015). The disaster
recovery site in the cloud helps in reducing the data maintenance spaces and resources in a much
formative way. Thus, cloud-based disaster recovery sites are cheaper and are more transparent for
companies.
2.5 Future trends
7
be used to download the log data from the cloud and send the request message with the name of the tag.
Lastly, the request is sent to delete the message or log, and then the response is sent by the cloud to delete
the tag. This is the process that needs to be followed by log management party in order to upload,
download and delete the log according to their tags in the cloud system.
Angin et al. (2010) have further stated that it is important for the organization to decide on the model
they want to use to manage their log in the cloud. However, it is necessary that they are clear about the
reason they want to collect the log for and the amount of security that needs to be maintained. The first
consideration is to see the type of data that needs to be collected and the event that will be addressed by it.
This will help them to address the fact that whether it is adequate to manage log internally or in the cloud.
This is because the log that needs to be shared by various people or in areas will always use cloud so that
it can be effectively done. Thirdly, the organization needs to test the system before securing the log in any
one of the types of system. The protection that is offered by cloud shows the importance of syslog system
using cloud platform (Lehner, Sattler and Sattler 2013). There are others factors that need to be
considered while adopting cloud platform in log management such as Saas availability, a time limit for
the existence of the log, the time of delivery of the log to the client, maintaining the compliance and
others. By looking at these factors, the management decides to take up Syslog system based on a cloud
platform. Lee et al. (2011) have pointed out that offering encrypted data is one more benefit of log
management using the cloud. Encrypted protocols manage the log in the most protective way so that one
tag is not used by any other clients.
2.4 Disaster Recovery Sites with Encrypted Log
According to Chang (2015), disaster recovery site is termed as a facility that can be used by an
organization to restore its services or infrastructure if there is some threat or security issue has happened
within it. Thereis are intensive planning and cost required to be made by the organization while deciding
the disaster recovery site for themselves. However, broadly two types of disaster management site are
used such as internal and external. Internal sites are set up and maintained by an organization, and the
external site is owned by the outside provider. One of the most important requirements for disaster
recovery is the distance of the organization from it. This is because a closer site helps in better
management of the data and costs less. Whereas, the site that far causes replication and cost a lot to the
company. Thus, the distance of disaster management sites also helps in managing the log in a different
way. Further, along with internal and external disaster recovery sites, there is also the use of a cloud-
based recovery site used by the company (Sahebjamnia, Torabi and Mansouri 2015). The disaster
recovery site in the cloud helps in reducing the data maintenance spaces and resources in a much
formative way. Thus, cloud-based disaster recovery sites are cheaper and are more transparent for
companies.
2.5 Future trends
7
The future trend that is seen from the entire works of literature is that there is still future
scope of expansion and usage of cloud based disaster management. This is because it is one
of the most recent technologies that is used and it helps in maintaining the data and its security
in a most minimum space. The future trend of the research is to see the way the cloud based
disaster recovery sites have been used by the company and the benefit it has offered to them.
The research will help in estimating the future trend of the usage of such type of log
management. Along with cloud based management, there are various other developed that can
be expected in log management for years. This will help in expanding the scope of log
management in disaster management.
2.6 Problem definition
The literature review helped in identifying the problem definition that needs to be studied
in the research. The paper surveyed into the growth and ability of cloud based disaster
management system and disaster recovery site by the companies that maintain secured data.
The research heled in knowing whether the cloud based syslog management is effective in
managing the log and keeping it secured in the cloud environment, as the literature has shown
that cloud platform log management helps in managing the log of the company in a better and
low space environment. Further, the system is also cost effective and secure data more
effectively. Further, syslog in cloud management is also important in solving any security
disaster event that has occurred in the cloud. Thus, the literature has helped in defining the
problem and also in stating some of the areas that showed the importance of the system. The
main problem is the research has solved to estimate the efficiency of the cloud based syslog
disaster management and disaster recovery site with encrypted data. This helped in answering
any disaster that has taken place in the system regarding log and the ways in which cloud
based syslog helped in managing the disaster.
2.7 Summary
From the above analysis of the past works of literature, it was seen that log management is one
of the most important parts of the business ad it involves collecting data and information
regarding an event. Log management is a crucial part and involves various security issue and
requirement. Log management is of different types of involves understanding the most effective
one that can be used to manage information about an event. Log management is one of the
most important factors in managing the disaster that has occurred in the organization in its data
regarding an event with the help of disaster recovery sites. The disaster recovery sites are
chosen by the company to help them with the security issue that has taken place in their
system. There can be various disasters that take place in the organization such as with data
and other alarming secondary sites. Then the organization adopts the disaster management
8
scope of expansion and usage of cloud based disaster management. This is because it is one
of the most recent technologies that is used and it helps in maintaining the data and its security
in a most minimum space. The future trend of the research is to see the way the cloud based
disaster recovery sites have been used by the company and the benefit it has offered to them.
The research will help in estimating the future trend of the usage of such type of log
management. Along with cloud based management, there are various other developed that can
be expected in log management for years. This will help in expanding the scope of log
management in disaster management.
2.6 Problem definition
The literature review helped in identifying the problem definition that needs to be studied
in the research. The paper surveyed into the growth and ability of cloud based disaster
management system and disaster recovery site by the companies that maintain secured data.
The research heled in knowing whether the cloud based syslog management is effective in
managing the log and keeping it secured in the cloud environment, as the literature has shown
that cloud platform log management helps in managing the log of the company in a better and
low space environment. Further, the system is also cost effective and secure data more
effectively. Further, syslog in cloud management is also important in solving any security
disaster event that has occurred in the cloud. Thus, the literature has helped in defining the
problem and also in stating some of the areas that showed the importance of the system. The
main problem is the research has solved to estimate the efficiency of the cloud based syslog
disaster management and disaster recovery site with encrypted data. This helped in answering
any disaster that has taken place in the system regarding log and the ways in which cloud
based syslog helped in managing the disaster.
2.7 Summary
From the above analysis of the past works of literature, it was seen that log management is one
of the most important parts of the business ad it involves collecting data and information
regarding an event. Log management is a crucial part and involves various security issue and
requirement. Log management is of different types of involves understanding the most effective
one that can be used to manage information about an event. Log management is one of the
most important factors in managing the disaster that has occurred in the organization in its data
regarding an event with the help of disaster recovery sites. The disaster recovery sites are
chosen by the company to help them with the security issue that has taken place in their
system. There can be various disasters that take place in the organization such as with data
and other alarming secondary sites. Then the organization adopts the disaster management
8
sites to the receiver the disaster that has taken place and secures it in the most protective way.
Cloud disaster recovery site is one type of DR sites that the business adopted as it takes less
space and helps in managing the data in a more streamlined manner. Further, the cloud
disaster management is also cost effective and is considered the best option for recovering or
preventing disaster for various unknown events.
9
Cloud disaster recovery site is one type of DR sites that the business adopted as it takes less
space and helps in managing the data in a more streamlined manner. Further, the cloud
disaster management is also cost effective and is considered the best option for recovering or
preventing disaster for various unknown events.
9
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
3. Technology
3.1 Research Design
Research design forms an integral part of the research as it helped the researcher to mover
with the investigation in a systematic manner. The research method that was followed in this
research was a qualitative method. Qualitative research is the most appropriate method for this
paper because investigating information from various sources and analyzing it in a descriptive,
critical manner helped in offering a better understanding into the topic (Amaratunga et al. 2002).
Qualitative methods have also helped in understanding the result that showed the extent to
which cloud-based syslog management has been used in disaster recovery. Further, the
method that was used to collect data for the qualitative research involved secondary and
primary method. Secondary method collected data from sources such as ProQuest, Google
Scholar and others (Kothari 2004). Further, primary data was collected from the managers of
companies that have the tendencies to be affected by the disaster and knowing whether they
use the cloud-based Syslog management. Thus, the entire research was based on qualitative
research and two methods of data collection.
3.2 Work Plan
The work plan is one of the important parts to be decided for the research because it
helped in planning out the ways in which the investigation took place. The work plan helped in
reducing the errors in various processes and also in the outcome of the research. The work plan
for the research consisted of the research approach, research philosophy, data collection
method, and data analysis method. Together based on these works the final outcome of the
paper was reached (Kumar and Phrommathed 2005). The investigation took place by placing
the actual motive of the research and then moving on different research method separately so
that information is collected from each source effectively with minimum chances of errors.
3.3 Research Approach
Research approach helps in defining the way in which the researcher has moved on with
the data collection procedure and to come up with the most accurate outcome. There were two
research approach options available to the researcher such as deductive approach and
inductive approach. The deductive approach helps in deducing or collecting data from existing
sources or information that is already available in reliable internet sources. However, the
inductive approach allows collecting new data from the source that is most useful for the
10
3.1 Research Design
Research design forms an integral part of the research as it helped the researcher to mover
with the investigation in a systematic manner. The research method that was followed in this
research was a qualitative method. Qualitative research is the most appropriate method for this
paper because investigating information from various sources and analyzing it in a descriptive,
critical manner helped in offering a better understanding into the topic (Amaratunga et al. 2002).
Qualitative methods have also helped in understanding the result that showed the extent to
which cloud-based syslog management has been used in disaster recovery. Further, the
method that was used to collect data for the qualitative research involved secondary and
primary method. Secondary method collected data from sources such as ProQuest, Google
Scholar and others (Kothari 2004). Further, primary data was collected from the managers of
companies that have the tendencies to be affected by the disaster and knowing whether they
use the cloud-based Syslog management. Thus, the entire research was based on qualitative
research and two methods of data collection.
3.2 Work Plan
The work plan is one of the important parts to be decided for the research because it
helped in planning out the ways in which the investigation took place. The work plan helped in
reducing the errors in various processes and also in the outcome of the research. The work plan
for the research consisted of the research approach, research philosophy, data collection
method, and data analysis method. Together based on these works the final outcome of the
paper was reached (Kumar and Phrommathed 2005). The investigation took place by placing
the actual motive of the research and then moving on different research method separately so
that information is collected from each source effectively with minimum chances of errors.
3.3 Research Approach
Research approach helps in defining the way in which the researcher has moved on with
the data collection procedure and to come up with the most accurate outcome. There were two
research approach options available to the researcher such as deductive approach and
inductive approach. The deductive approach helps in deducing or collecting data from existing
sources or information that is already available in reliable internet sources. However, the
inductive approach allows collecting new data from the source that is most useful for the
10
research, as the researcher used both primary and secondary data for the outcome of the
research (Prasad et al. 2012). This means that it used both deductive and inductive approach.
This is because a mixed approach helped the researcher to reach out to the data separately
and in the most effective manner. The deductive approach was beneficial for the researcher to
collect secondary data and inductive approach was used to collect data from primary sources.
Thus, it was appropriate to use both the approach so that there is no confusion in collecting the
data.
3.4 Research Philosophy
Research philosophy helps in defining the logic that the researcher has used in moving
on with the research and collecting data. Logic is important to realize so that the outcome and
the information that is being collected has some value. There are various research philosophies
that can be used by the research papers depending on the area that needs to be investigated.
The researcher in this paper used two types of research philosophy such as interpretivism and
positivist philosophy. This is because these two philosophies go well with primary and
secondary research (Newman and Benz 1998). The interpretivism philosophy is appropriate for
collecting primary research, as this philosophy helps in knowing that only in interfering with the
reality and searching helps in knowing the actual fact. On the other hand, positivism philosophy
is used in investigating secondary data as the philosophy states that the actual fact and reality is
known without interfering with the reality and just by observing the fact. As the paper used the
mixed method, thus, it was dependent on both these philosophy (Kumar and Phrommathed
2005). There is another philosophy as well that is used by the researchers; however, it was not
suitable for this research paper. As secondary data was collected from past works of literature
by just observing the findings and primary data was collected by interfering into the companies
and knowing the level of preparation they have for disaster recovery and type of disaster
recovery they are using.
3.5 Data collection method
Data collection method is deemed to be one of the most important parts of the research
as it helps in getting the valuable information on the entire outcome is dependent. There are two
types of data collection method that is used in a paper such as the primary data collection
method and secondary data collection method. Primary data collection method helps in
collecting data directly from the source of inquiry to get raw data about the study area (Kothari
2004). Further, the secondary data analyzes the old sources that have been already researched
by past scholars. The researcher used a mixed methodology for this research paper in which it
used both secondary and primary sources. Each had their own importance in getting the final
outcome of the paper. Mixed method is useful in a research paper because it helps in getting a
wide picture of the study area (Pakes and Schankerman 1984). For secondary research, old
11
research (Prasad et al. 2012). This means that it used both deductive and inductive approach.
This is because a mixed approach helped the researcher to reach out to the data separately
and in the most effective manner. The deductive approach was beneficial for the researcher to
collect secondary data and inductive approach was used to collect data from primary sources.
Thus, it was appropriate to use both the approach so that there is no confusion in collecting the
data.
3.4 Research Philosophy
Research philosophy helps in defining the logic that the researcher has used in moving
on with the research and collecting data. Logic is important to realize so that the outcome and
the information that is being collected has some value. There are various research philosophies
that can be used by the research papers depending on the area that needs to be investigated.
The researcher in this paper used two types of research philosophy such as interpretivism and
positivist philosophy. This is because these two philosophies go well with primary and
secondary research (Newman and Benz 1998). The interpretivism philosophy is appropriate for
collecting primary research, as this philosophy helps in knowing that only in interfering with the
reality and searching helps in knowing the actual fact. On the other hand, positivism philosophy
is used in investigating secondary data as the philosophy states that the actual fact and reality is
known without interfering with the reality and just by observing the fact. As the paper used the
mixed method, thus, it was dependent on both these philosophy (Kumar and Phrommathed
2005). There is another philosophy as well that is used by the researchers; however, it was not
suitable for this research paper. As secondary data was collected from past works of literature
by just observing the findings and primary data was collected by interfering into the companies
and knowing the level of preparation they have for disaster recovery and type of disaster
recovery they are using.
3.5 Data collection method
Data collection method is deemed to be one of the most important parts of the research
as it helps in getting the valuable information on the entire outcome is dependent. There are two
types of data collection method that is used in a paper such as the primary data collection
method and secondary data collection method. Primary data collection method helps in
collecting data directly from the source of inquiry to get raw data about the study area (Kothari
2004). Further, the secondary data analyzes the old sources that have been already researched
by past scholars. The researcher used a mixed methodology for this research paper in which it
used both secondary and primary sources. Each had their own importance in getting the final
outcome of the paper. Mixed method is useful in a research paper because it helps in getting a
wide picture of the study area (Pakes and Schankerman 1984). For secondary research, old
11
sources are researched such as past works on log management, syslog management, disaster
recovery site, and others. Further, for primary sources, the researcher collected information
from five companies in India that use a disaster recovery site or system to protect their data
from sudden disaster. This helped them get a current knowledge about the extent to which
cloud-based syslog disaster management system is used. Primary data was collected with the
help of survey method in which 2 managers from each company were surveyed using a
questionnaire; the questionnaire consisted of closed-ended questions so that it can be filled
quickly by the managers. There were 20 questions in the survey, and it helped in getting a clear
picture of the use of cloud-based syslog management.
3.6 Sampling method and size
Sampling size is an important factor in research as it helps in collecting data from a large
population. The population was huge in this paper that is the companies that are prone to
disaster and opts various disaster management systems to protect their data from any kind of
loss. The sampling size that was chosen for the research was five companies that are prone to
any kind of disaster and the extent of protection that they are using. The method that was used
was a non-probabilistic sampling method because the chances of getting selected for the survey
were the companies that were more prone to any kind of disaster.
3.7 Data analysis method
There are two types of method that is used for analyzing the collected data such as the
qualitative method and quantitative method. The qualitative method helps in analyzing the data
in various ways such as case study format, descriptive format and others (Kothari 2004). On the
other hand, the quantitative method uses various mathematical and statistical tools. The paper
used a qualitative analysis method to describe the result that has been derived from the survey
and past literature (Holt 2009). The data has been analyzed in a descriptive way so that it is
easy to explain the extent to which cloud-based syslog disaster management is being used by
the companies. It was also helpful as the reader can understand the result of the research
easily.
3.8 Research Ethics
Research has been conducted in an ethical manner so that no one gets harmed in the
investigation process. It is important to consider research ethics when human beings are
involved in the data collection process. All the ethical considerations were kept in mind so that it
12
recovery site, and others. Further, for primary sources, the researcher collected information
from five companies in India that use a disaster recovery site or system to protect their data
from sudden disaster. This helped them get a current knowledge about the extent to which
cloud-based syslog disaster management system is used. Primary data was collected with the
help of survey method in which 2 managers from each company were surveyed using a
questionnaire; the questionnaire consisted of closed-ended questions so that it can be filled
quickly by the managers. There were 20 questions in the survey, and it helped in getting a clear
picture of the use of cloud-based syslog management.
3.6 Sampling method and size
Sampling size is an important factor in research as it helps in collecting data from a large
population. The population was huge in this paper that is the companies that are prone to
disaster and opts various disaster management systems to protect their data from any kind of
loss. The sampling size that was chosen for the research was five companies that are prone to
any kind of disaster and the extent of protection that they are using. The method that was used
was a non-probabilistic sampling method because the chances of getting selected for the survey
were the companies that were more prone to any kind of disaster.
3.7 Data analysis method
There are two types of method that is used for analyzing the collected data such as the
qualitative method and quantitative method. The qualitative method helps in analyzing the data
in various ways such as case study format, descriptive format and others (Kothari 2004). On the
other hand, the quantitative method uses various mathematical and statistical tools. The paper
used a qualitative analysis method to describe the result that has been derived from the survey
and past literature (Holt 2009). The data has been analyzed in a descriptive way so that it is
easy to explain the extent to which cloud-based syslog disaster management is being used by
the companies. It was also helpful as the reader can understand the result of the research
easily.
3.8 Research Ethics
Research has been conducted in an ethical manner so that no one gets harmed in the
investigation process. It is important to consider research ethics when human beings are
involved in the data collection process. All the ethical considerations were kept in mind so that it
12
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
is easy for the researcher to collect the information. The first ethical consideration that was kept
in mind while making the questionnaire that none of the questions should be personal and harm
the dignity of the participants. The questions were thus focused directly on the study area and
not any personal information such as their duration in the company or their rights in the
company or any other (Resnik 2011). Secondly, the respondents were asked to give their
answer independently and thus asked to complete the survey by sitting in different rooms and
different systems. This was done so that there were no cumulative answers received or biases
faced in the survey result. Thirdly, it was seen that the survey is filled anonymously and so the
participants were asked not to write their names or give any information regarding their identity.
This was done so that the answers given by them do not affect their job or create any negative
impact. Lastly, it was seen that confidentiality of the answers was maintained and all the data
was saved in a soft copy format with encryption so that it is accessible only by the researcher.
This was done so that the collected data is only used for the research purpose of this paper only
and not for any other works (Gregory 2003). Thus, ethical consideration was important as it
helped in maintaining in conducting the research in an ethical and correct way.
13
in mind while making the questionnaire that none of the questions should be personal and harm
the dignity of the participants. The questions were thus focused directly on the study area and
not any personal information such as their duration in the company or their rights in the
company or any other (Resnik 2011). Secondly, the respondents were asked to give their
answer independently and thus asked to complete the survey by sitting in different rooms and
different systems. This was done so that there were no cumulative answers received or biases
faced in the survey result. Thirdly, it was seen that the survey is filled anonymously and so the
participants were asked not to write their names or give any information regarding their identity.
This was done so that the answers given by them do not affect their job or create any negative
impact. Lastly, it was seen that confidentiality of the answers was maintained and all the data
was saved in a soft copy format with encryption so that it is accessible only by the researcher.
This was done so that the collected data is only used for the research purpose of this paper only
and not for any other works (Gregory 2003). Thus, ethical consideration was important as it
helped in maintaining in conducting the research in an ethical and correct way.
13
4. Design
This section states the detailed design or structure in which the research was conducted,
and the solution was received in an effective way. There was a format that was followed for the
entire research process such as designing method, approaching sources, collecting data and
deducing result.
Modules Task did
Secondary data collection
This module collected information on the
research area such as on log management,
syslog management, cloud-based Syslog
management, disaster recovery sites from
past works of literature and articles
Primary data collection This module collected data from the
companies with the help of a survey so that
the real scenario of Syslog management is
known by the researcher.
Findings of the process This is the third module that is related to
the above two modules in which the findings or
information gathered from both the sources
are gathered and placed in a systematic
format.
Evaluation of the data The evaluation is also based on the third
module in which the data is analyzed and
explained to state the outcome that is reached
from the entire research
Deducing results The last module is about concluding the
outcome and stating the final result that has
been received from the entire research along
with an area for future research scope.
Table 1- Modules of the paper
Source- Author generated
14
This section states the detailed design or structure in which the research was conducted,
and the solution was received in an effective way. There was a format that was followed for the
entire research process such as designing method, approaching sources, collecting data and
deducing result.
Modules Task did
Secondary data collection
This module collected information on the
research area such as on log management,
syslog management, cloud-based Syslog
management, disaster recovery sites from
past works of literature and articles
Primary data collection This module collected data from the
companies with the help of a survey so that
the real scenario of Syslog management is
known by the researcher.
Findings of the process This is the third module that is related to
the above two modules in which the findings or
information gathered from both the sources
are gathered and placed in a systematic
format.
Evaluation of the data The evaluation is also based on the third
module in which the data is analyzed and
explained to state the outcome that is reached
from the entire research
Deducing results The last module is about concluding the
outcome and stating the final result that has
been received from the entire research along
with an area for future research scope.
Table 1- Modules of the paper
Source- Author generated
14
5. Approach
This section explains the way in which the entire research process was approached by the
researcher in order to reach the final outcome. The section reflects the entire meaning and
purpose of the investigation that was conducted. The research started by forming the entire
structure of the paper so that the researcher is clear about the process that needs to be
addressed. The structure of the paper consisted of the purpose of the research, the type of data
that is needed, the methodology adopted and others. The second step was to collect data and
information for the research. For this purpose, the inputs used were secondary and primary
data. For the secondary data, the type of papers that were studied on the internet was articles,
journals, and others. This helped in putting the inputs in the research such as log management,
syslog management, disaster management, cloud-based Syslog management, disaster
recovery sites, and others. The inputs that were used to find primary data consisted of
managers that gave information such as the type of disaster they faced, the impact on their
database, the disaster recovery sites used by them, the effectiveness of cloud computing and
others. Following the collection of data from these sources, the data was then analyzed and
evaluated with the help of descriptive technology so that information is covered effectively. The
last step consisted of concluding to the final outcome of the result and receives positive
feedback for cloud-based syslog disaster management. This was the actual output received
from the entire research process. One of the most important inputs in the research was time as
it was required in each and every time so that most accurate outcome is received.
15
This section explains the way in which the entire research process was approached by the
researcher in order to reach the final outcome. The section reflects the entire meaning and
purpose of the investigation that was conducted. The research started by forming the entire
structure of the paper so that the researcher is clear about the process that needs to be
addressed. The structure of the paper consisted of the purpose of the research, the type of data
that is needed, the methodology adopted and others. The second step was to collect data and
information for the research. For this purpose, the inputs used were secondary and primary
data. For the secondary data, the type of papers that were studied on the internet was articles,
journals, and others. This helped in putting the inputs in the research such as log management,
syslog management, disaster management, cloud-based Syslog management, disaster
recovery sites, and others. The inputs that were used to find primary data consisted of
managers that gave information such as the type of disaster they faced, the impact on their
database, the disaster recovery sites used by them, the effectiveness of cloud computing and
others. Following the collection of data from these sources, the data was then analyzed and
evaluated with the help of descriptive technology so that information is covered effectively. The
last step consisted of concluding to the final outcome of the result and receives positive
feedback for cloud-based syslog disaster management. This was the actual output received
from the entire research process. One of the most important inputs in the research was time as
it was required in each and every time so that most accurate outcome is received.
15
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
6. Implementation
This is the section that states the way by which the implementation of the entire
investigation took place. It places the implementation of every module and the findings that have
been obtained from it. The section is important to judge whether the process of the research has
been done according to the module that has been designed.
6.1 Module 1 and 2: Primary and Secondary data collection
The survey was sent to the companies for filling up the questionnaire. The questionnaire
was formed and is placed in the appendix. The primary data collection was done in a systematic
manner, and the entire result obtained from the primary data has been stated below. The
questionnaire was mailed to the managers through electronic mail, and the answer was also
received through the same process. The secondary data was collected using past works of
literature, and the outcome is stated in the above section of the literature review. The first two
modules were implemented successfully, and the result has been obtained for further process.
6.2 Module 3- Findings
This section places the data and that it has collected from the survey. The result for the
survey has been stated below in percentage form for each question and the responses by all 10
managers. Findings from secondary data that is past works of literature have been stated above
in chapter two that is literature review section. Both showed the findings from the investigation
initiated.
1. Do you use disaster recovery sites for managing your data or important log?
Options Responses Percentage
Yes 6 60%
No 4 40%
Neutral 0 0%
2. Are you aware of cloud based syslog disaster management?
Options Responses Percentage
Yes 8 80%
No 2 20%
Neutral 0 0%
16
This is the section that states the way by which the implementation of the entire
investigation took place. It places the implementation of every module and the findings that have
been obtained from it. The section is important to judge whether the process of the research has
been done according to the module that has been designed.
6.1 Module 1 and 2: Primary and Secondary data collection
The survey was sent to the companies for filling up the questionnaire. The questionnaire
was formed and is placed in the appendix. The primary data collection was done in a systematic
manner, and the entire result obtained from the primary data has been stated below. The
questionnaire was mailed to the managers through electronic mail, and the answer was also
received through the same process. The secondary data was collected using past works of
literature, and the outcome is stated in the above section of the literature review. The first two
modules were implemented successfully, and the result has been obtained for further process.
6.2 Module 3- Findings
This section places the data and that it has collected from the survey. The result for the
survey has been stated below in percentage form for each question and the responses by all 10
managers. Findings from secondary data that is past works of literature have been stated above
in chapter two that is literature review section. Both showed the findings from the investigation
initiated.
1. Do you use disaster recovery sites for managing your data or important log?
Options Responses Percentage
Yes 6 60%
No 4 40%
Neutral 0 0%
2. Are you aware of cloud based syslog disaster management?
Options Responses Percentage
Yes 8 80%
No 2 20%
Neutral 0 0%
16
3. Do you think syslog management is crucial for the company to get saved from disaster?
Options Responses Percentage
Yes 8 80%
No 1 10%
Neutral 1 10%
4. Is the company involved in natural disaster recovery planning?
Options Responses Percentage
Yes 6 60%
No 2 20%
Neutral 2 20%
5. Are your company prone to natural or man-mad disaster?
Options Responses Percentage
Yes 4 40%
No 4 40%
Neutral 2 20%
6. Is your management conducting a risk assessment for any negative situation?
Options Responses Percentage
Yes 2 20%
No 2 20%
Neutral 6 60%
7. What kind of disaster have you faced over the time in your business?
Options Responses Percentage
Natural Disaster 2 20%
Man-made Disaster 2 20%
Both 6 60%
17
Options Responses Percentage
Yes 8 80%
No 1 10%
Neutral 1 10%
4. Is the company involved in natural disaster recovery planning?
Options Responses Percentage
Yes 6 60%
No 2 20%
Neutral 2 20%
5. Are your company prone to natural or man-mad disaster?
Options Responses Percentage
Yes 4 40%
No 4 40%
Neutral 2 20%
6. Is your management conducting a risk assessment for any negative situation?
Options Responses Percentage
Yes 2 20%
No 2 20%
Neutral 6 60%
7. What kind of disaster have you faced over the time in your business?
Options Responses Percentage
Natural Disaster 2 20%
Man-made Disaster 2 20%
Both 6 60%
17
Question 7
0%
10%
20%
30%
40%
50%
60%
70%
Chart Title
NATURAL DISASTER MAN-MADE DISASTER BOTH
8. Was your business able to recover the impact on data center and from data loss?
Options Responses Percentage
Yes 4 40%
No 4 40%
Neutral 2 20%
9. Are you prepared by your kind of disaster recovery strategies and equipment?
Options Responses Percentage
Yes 4 70%
No 2 30%
Neutral 4 0%
18
0%
10%
20%
30%
40%
50%
60%
70%
Chart Title
NATURAL DISASTER MAN-MADE DISASTER BOTH
8. Was your business able to recover the impact on data center and from data loss?
Options Responses Percentage
Yes 4 40%
No 4 40%
Neutral 2 20%
9. Are you prepared by your kind of disaster recovery strategies and equipment?
Options Responses Percentage
Yes 4 70%
No 2 30%
Neutral 4 0%
18
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Question
1
Question
2
Question
3
Question
4
Question
5
Question
6
Question
8
Question
9
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
Responses for question 1 to 6, 8 AND 9
Yes No Neutral
10. What kind of disaster recovery site do you use for your business?
Options Responses Percentage
Internal DR 2 20%
External DR 2 20%
Cloud DR 6 60%
Mobile DR 0 0%
Question 10
0%
10%
20%
30%
40%
50%
60%
70%
Responses for question 10
INTERNAL DR EXTERNAL DR CLOUD DR MOBILE DR
19
1
Question
2
Question
3
Question
4
Question
5
Question
6
Question
8
Question
9
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
Responses for question 1 to 6, 8 AND 9
Yes No Neutral
10. What kind of disaster recovery site do you use for your business?
Options Responses Percentage
Internal DR 2 20%
External DR 2 20%
Cloud DR 6 60%
Mobile DR 0 0%
Question 10
0%
10%
20%
30%
40%
50%
60%
70%
Responses for question 10
INTERNAL DR EXTERNAL DR CLOUD DR MOBILE DR
19
11. Do you think cloud based disaster recovery site is an effective way to save your data from
disaster?
Options Responses Percentage
Yes 6 60%
No 2 20%
Neutral 2 20%
12. Do you think there is a security issue related to cloud based syslog disaster management?
Options Responses Percentage
Yes 6 60%
No 4 40%
Neutral 0 0%
13. Is communication is better for cloud based technology?
Options Responses Percentage
Yes 6 60%
No 2 20%
Neutral 2 20%
14. Does cloud disaster recovery help in case of wide reaching disaster?
Options Responses Percentage
Yes 7 70%
No 2 20%
Neutral 1 10%
15. Do you think saving data backup in the cloud can secure it and is out of reach of any potential
natural disaster?
Options Responses Percentage
Yes 6 60%
No 1 10%
Neutral 3 30%
16. Is the cloud based syslog management more appropriate only in the case of small companies?
20
disaster?
Options Responses Percentage
Yes 6 60%
No 2 20%
Neutral 2 20%
12. Do you think there is a security issue related to cloud based syslog disaster management?
Options Responses Percentage
Yes 6 60%
No 4 40%
Neutral 0 0%
13. Is communication is better for cloud based technology?
Options Responses Percentage
Yes 6 60%
No 2 20%
Neutral 2 20%
14. Does cloud disaster recovery help in case of wide reaching disaster?
Options Responses Percentage
Yes 7 70%
No 2 20%
Neutral 1 10%
15. Do you think saving data backup in the cloud can secure it and is out of reach of any potential
natural disaster?
Options Responses Percentage
Yes 6 60%
No 1 10%
Neutral 3 30%
16. Is the cloud based syslog management more appropriate only in the case of small companies?
20
Options Responses Percentage
Yes 5 50%
No 2 20%
Neutral 3 30%
17. Are you planning to use cloud based disaster management technology in the near future as
well?
Options Responses Percentage
Yes 6 60%
No 2 20%
Neutral 2 20%
18. Do you think that big data can be easily floated in the cloud than in any other type of disaster
recovery sites?
Options Responses Percentage
Yes 8 80%
No 1 10%
Neutral 1 10%
19. Are there any errors received in the cloud server while saving or transporting the data in cloud
DR sites?
Options Responses Percentage
Yes 4 40%
No 4 40%
Neutral 2 20%
21
Yes 5 50%
No 2 20%
Neutral 3 30%
17. Are you planning to use cloud based disaster management technology in the near future as
well?
Options Responses Percentage
Yes 6 60%
No 2 20%
Neutral 2 20%
18. Do you think that big data can be easily floated in the cloud than in any other type of disaster
recovery sites?
Options Responses Percentage
Yes 8 80%
No 1 10%
Neutral 1 10%
19. Are there any errors received in the cloud server while saving or transporting the data in cloud
DR sites?
Options Responses Percentage
Yes 4 40%
No 4 40%
Neutral 2 20%
21
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Question
12
Question
13
Question
14
Question
15
Question
16
Question
17
Question
18
Question
19
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
Responses for question 12 to 19
YES NO NEUTRAL
20. Is your cloud based disaster recovery site near or far away from the actual data site?
Options Responses Percentage
Near 8 80%
Far 2 20%
Question 20
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
Responses for question 20
Near Far Column1
22
12
Question
13
Question
14
Question
15
Question
16
Question
17
Question
18
Question
19
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
Responses for question 12 to 19
YES NO NEUTRAL
20. Is your cloud based disaster recovery site near or far away from the actual data site?
Options Responses Percentage
Near 8 80%
Far 2 20%
Question 20
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
Responses for question 20
Near Far Column1
22
6.3 Module 4- Evaluation
After the findings were received the next module was implemented, and evaluation was
done based on both secondary and primary data. The sections for both primary and secondary
data were separated in two sections before the final result is deduced. The findings from the
literature were deduced and written in a descriptive form. Further, the findings from each
question of the survey were discussed in the next section. Two sections gave the entire picture
of the data that has been obtained from the research. The evaluation has been done in a critical
manner to understand both the positive point and negative point and then reach a conclusion
regarding the method.
6.4 Module 5- Conclusion
This was the final section that was covered, and it offered summative findings from both
secondary and primary research and answered the research question. The conclusion deduced
the findings and stated that cloud based syslog disaster management system and disaster
recovery site is one of the widely used systems and it has various advantages in managing data
and logs during the disaster, both natural and man-made. Further, this section also detected the
areas that can be used for future research by the researcher on this topic. The future area will
help the researcher to investigate future in this topic in future.
7. Evaluation
After reviewing the secondary data, it has been found that there are different types of design
standards that make it easier to process the information and this also helps in the determination
of the severity of the entire data. The process of syslog data management makes it easier to
separate the data, and thus better analysis can be done through it. It also helps in the
determination of the severity process, and thus this is important to transfer the data that is
utilised in a different situation. The logs that help in the transmission of information makes it
easier to solve the issues in an emergency situation, and all the desired level of information can
be managed accordingly. It has been found that the server that is placed at the centre of the
management system has made it much easier to carry out the work processes (Lemoudden
2017). The investigation process with the help of network research system is one of the most
important ways of analysing and addressing the critical events that take place through large
premises of data sets. On the other hand, it has been found that there is the provision of better
efforts in order to protect the syslog server and thus proper conclusion can be reached easily
through this aspect.
The log-based management system plays a crucial role in the decision-making process, and
thus an individual can access the data from anywhere when it is stored in the cloud process. It
is the responsibility of the management to check that there is the provision of internal log and
this will make it easier in order to solve the issues accordingly. Moreover, it is necessary to
check that there should be an arrangement of the proper facility in order to carry out the
23
After the findings were received the next module was implemented, and evaluation was
done based on both secondary and primary data. The sections for both primary and secondary
data were separated in two sections before the final result is deduced. The findings from the
literature were deduced and written in a descriptive form. Further, the findings from each
question of the survey were discussed in the next section. Two sections gave the entire picture
of the data that has been obtained from the research. The evaluation has been done in a critical
manner to understand both the positive point and negative point and then reach a conclusion
regarding the method.
6.4 Module 5- Conclusion
This was the final section that was covered, and it offered summative findings from both
secondary and primary research and answered the research question. The conclusion deduced
the findings and stated that cloud based syslog disaster management system and disaster
recovery site is one of the widely used systems and it has various advantages in managing data
and logs during the disaster, both natural and man-made. Further, this section also detected the
areas that can be used for future research by the researcher on this topic. The future area will
help the researcher to investigate future in this topic in future.
7. Evaluation
After reviewing the secondary data, it has been found that there are different types of design
standards that make it easier to process the information and this also helps in the determination
of the severity of the entire data. The process of syslog data management makes it easier to
separate the data, and thus better analysis can be done through it. It also helps in the
determination of the severity process, and thus this is important to transfer the data that is
utilised in a different situation. The logs that help in the transmission of information makes it
easier to solve the issues in an emergency situation, and all the desired level of information can
be managed accordingly. It has been found that the server that is placed at the centre of the
management system has made it much easier to carry out the work processes (Lemoudden
2017). The investigation process with the help of network research system is one of the most
important ways of analysing and addressing the critical events that take place through large
premises of data sets. On the other hand, it has been found that there is the provision of better
efforts in order to protect the syslog server and thus proper conclusion can be reached easily
through this aspect.
The log-based management system plays a crucial role in the decision-making process, and
thus an individual can access the data from anywhere when it is stored in the cloud process. It
is the responsibility of the management to check that there is the provision of internal log and
this will make it easier in order to solve the issues accordingly. Moreover, it is necessary to
check that there should be an arrangement of the proper facility in order to carry out the
23
servicing process and this will assist in the implementation of the entire system. There should
be provisions for the transfer of data and the cloud provider must be set up in such a way that it
will give an alert in times of emergency or in critical situations when determining the events. The
protocols that are used in the management system helps in the development of encrypted
protocols as well as the confidentiality of the data sets accordingly. These logs encourage the
users to send the message and retrieve it for future use. The protocols help to secure the key
information and also request the service provider to delete and access the data. Therefore, it
can be said that the Syslog management is useful in the management of data at the time of
disaster or any other events (Ylonen, Scarfone and Souppaya 2014).
It has been found that there are different processes in the management of data and this will
make it easier to develop the encrypted protocols accordingly. The cloud processes that are
used while uploading in the log system should have limited access, and this will make it easier
in order to handle the integrity process accordingly (Duncan and Whittington 2016). It is the
responsibility of the organization to check that the SaaS System and data availability will help in
maintaining the compliance-related issues and thus it should be checked that this information is
not utilized by any other clients. There should be better management of the entire system, and
this will help in the fulfillment of intensive planning and cost requirement. The external, as well
as the internal process that is related to data management, will help in maintaining the
resources and this is considered to be the cheaper way that has to be adopted by the
companies.
After conducting the primary survey, it has been found that majority of the managers of
the company have agreed to the aspect that they use disaster recovery site in order to restore
as well as recover the infrastructure of their organization. This makes it easier to process the
primary data, and it will help in the fulfillment of recovery cost objectives. It is the responsibility
of the managers who are employed in the organization to check that they have better skills to
maintain the internal site that is owned as well as operated by the company. Moreover, it has
been found that the managers have also agreed to have access to the functional data as well as
the customer information accordingly (Guster, Safonov and Hathaway 2014). The cold site
infrastructure that supports the IT system must have the provision to install the DR plans, and
this can be extended accordingly in the organization. It has also been found that 75% of the
managers have agreed to the fact that they use the cloud-based Syslog management in order to
protect their data sets. The cloud computing system is considered to be regressing, and it will
help in the management and handling of different processes. The end users will experience the
entire system to be less complicated than the new users (Ruha 2018). On the other hand, it can
be said that there are different concerns related to the management of the entire system and
this makes it easier to migrate to the cloud computing services accordingly. There should be
adequate provisions for the management of the data system in the cloud process, and this will
help in the collaboration process accordingly.
The primary data survey results also highlight that the companies use the security logs
in order to detect the malicious incidents. This makes it easier to handle the array of services,
and there will be too much difficulty in the collection of the data. However, the managers also
reported that a collection of huge data does not always help in the provision of better
information and it is not necessary to respond to these data sets accordingly. In such a
situation, it is necessary to handle the entire data sets and the processes so that the security
24
be provisions for the transfer of data and the cloud provider must be set up in such a way that it
will give an alert in times of emergency or in critical situations when determining the events. The
protocols that are used in the management system helps in the development of encrypted
protocols as well as the confidentiality of the data sets accordingly. These logs encourage the
users to send the message and retrieve it for future use. The protocols help to secure the key
information and also request the service provider to delete and access the data. Therefore, it
can be said that the Syslog management is useful in the management of data at the time of
disaster or any other events (Ylonen, Scarfone and Souppaya 2014).
It has been found that there are different processes in the management of data and this will
make it easier to develop the encrypted protocols accordingly. The cloud processes that are
used while uploading in the log system should have limited access, and this will make it easier
in order to handle the integrity process accordingly (Duncan and Whittington 2016). It is the
responsibility of the organization to check that the SaaS System and data availability will help in
maintaining the compliance-related issues and thus it should be checked that this information is
not utilized by any other clients. There should be better management of the entire system, and
this will help in the fulfillment of intensive planning and cost requirement. The external, as well
as the internal process that is related to data management, will help in maintaining the
resources and this is considered to be the cheaper way that has to be adopted by the
companies.
After conducting the primary survey, it has been found that majority of the managers of
the company have agreed to the aspect that they use disaster recovery site in order to restore
as well as recover the infrastructure of their organization. This makes it easier to process the
primary data, and it will help in the fulfillment of recovery cost objectives. It is the responsibility
of the managers who are employed in the organization to check that they have better skills to
maintain the internal site that is owned as well as operated by the company. Moreover, it has
been found that the managers have also agreed to have access to the functional data as well as
the customer information accordingly (Guster, Safonov and Hathaway 2014). The cold site
infrastructure that supports the IT system must have the provision to install the DR plans, and
this can be extended accordingly in the organization. It has also been found that 75% of the
managers have agreed to the fact that they use the cloud-based Syslog management in order to
protect their data sets. The cloud computing system is considered to be regressing, and it will
help in the management and handling of different processes. The end users will experience the
entire system to be less complicated than the new users (Ruha 2018). On the other hand, it can
be said that there are different concerns related to the management of the entire system and
this makes it easier to migrate to the cloud computing services accordingly. There should be
adequate provisions for the management of the data system in the cloud process, and this will
help in the collaboration process accordingly.
The primary data survey results also highlight that the companies use the security logs
in order to detect the malicious incidents. This makes it easier to handle the array of services,
and there will be too much difficulty in the collection of the data. However, the managers also
reported that a collection of huge data does not always help in the provision of better
information and it is not necessary to respond to these data sets accordingly. In such a
situation, it is necessary to handle the entire data sets and the processes so that the security
24
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
logs can be protected easily. There should be the provision of a centralized log management
system, and this will provide an idea of the security logs and the other related processes
(Linnakangas et al. 2017). The systems that are connected to the cloud-based system will have
the ability to send the main log file to the centralized location. The value, as well as the
versatility, depends on the third party agents of the organization who collects and sends the
data. The admins of these data sets use the free utilities, and there must be the special
provision of commercial options in order to check that the data sets perform well as there are no
such minor errors in the entire system.
The managers have also provided positive feedback in relation to the involvement of the
company in the disaster recovery plan. They have shown their concern that there is the scope of
an emergency response plan and thus it becomes easier for the employees to carry out the task
accordingly. The steps that are carried out in the disaster recovery plan will help in analyzing the
roles and responsibilities of the organization is a simple and clear way, and thus it will make it
easier to decide on the role of the communication plan and thus prevent the loss of customers
(Holland et al. 2016). The things that are to be considered at the beginning of the emergency
period must be backed up through better communication system and processes. On the other
hand, it is the responsibility of this business recovery plan to check that they protect the
employees as well as the customers so that they can return to their business accordingly. This
will help in the protection of physical resources, and thus the other facilities will conform to the
requirements of the local business. These data should be backed up in the system, and there
should be a separate copy of the data stored in the safe deposit box of the organization
(Patawari 2013).
The survey findings carried out among the managers also depicted a positive response in
relation to natural disaster made recovery planning. As it is difficult to predict the natural
disasters, the company must check that they have sufficient backup data in order to protect the
information set. This disaster recovery planning is considered to vary according to the location
of the company, and thus it helps in the prevention of data sets (Church et al. 2012). There are
some organisations that have faced man-made disasters also, and this is due to the
carelessness of the employees as well as the management. Moreover, it is necessary to craft
out the natural disaster recovery plan, and this will make the entire process imperative. There
might be an attack on the primary data centers, and this will help in the swift recovery of the
data sets accordingly (Kailash et al. 2018). The protocols that are used in this system will help in
making the organization fit to replace the displaced workers and also from the ransom ware
attack. On the other hand, it has been found that the management committee of these five
organizations is neutral is conducting the risk assessment plan. It is the responsibility of the
management to check that they can resist these changes and this will help in the proper
recovery of the data sets accordingly.
It has also been found in the survey that the business is able to recover the impact of data
loss as well as data centres. This data loss might also lead to reputational damage to the
organization, and thus it will be difficult to restore the data sets. There should be the accurate
provision of backup, and this will lay an impact on the organization accordingly. Moreover, the
managers have committed that these data loss sets back the process of productivity and it will
also lead to the loss of customer information. Therefore, it can be said that Syslog management
system helps to recover the lost data set and also in re-building the client information process
25
system, and this will provide an idea of the security logs and the other related processes
(Linnakangas et al. 2017). The systems that are connected to the cloud-based system will have
the ability to send the main log file to the centralized location. The value, as well as the
versatility, depends on the third party agents of the organization who collects and sends the
data. The admins of these data sets use the free utilities, and there must be the special
provision of commercial options in order to check that the data sets perform well as there are no
such minor errors in the entire system.
The managers have also provided positive feedback in relation to the involvement of the
company in the disaster recovery plan. They have shown their concern that there is the scope of
an emergency response plan and thus it becomes easier for the employees to carry out the task
accordingly. The steps that are carried out in the disaster recovery plan will help in analyzing the
roles and responsibilities of the organization is a simple and clear way, and thus it will make it
easier to decide on the role of the communication plan and thus prevent the loss of customers
(Holland et al. 2016). The things that are to be considered at the beginning of the emergency
period must be backed up through better communication system and processes. On the other
hand, it is the responsibility of this business recovery plan to check that they protect the
employees as well as the customers so that they can return to their business accordingly. This
will help in the protection of physical resources, and thus the other facilities will conform to the
requirements of the local business. These data should be backed up in the system, and there
should be a separate copy of the data stored in the safe deposit box of the organization
(Patawari 2013).
The survey findings carried out among the managers also depicted a positive response in
relation to natural disaster made recovery planning. As it is difficult to predict the natural
disasters, the company must check that they have sufficient backup data in order to protect the
information set. This disaster recovery planning is considered to vary according to the location
of the company, and thus it helps in the prevention of data sets (Church et al. 2012). There are
some organisations that have faced man-made disasters also, and this is due to the
carelessness of the employees as well as the management. Moreover, it is necessary to craft
out the natural disaster recovery plan, and this will make the entire process imperative. There
might be an attack on the primary data centers, and this will help in the swift recovery of the
data sets accordingly (Kailash et al. 2018). The protocols that are used in this system will help in
making the organization fit to replace the displaced workers and also from the ransom ware
attack. On the other hand, it has been found that the management committee of these five
organizations is neutral is conducting the risk assessment plan. It is the responsibility of the
management to check that they can resist these changes and this will help in the proper
recovery of the data sets accordingly.
It has also been found in the survey that the business is able to recover the impact of data
loss as well as data centres. This data loss might also lead to reputational damage to the
organization, and thus it will be difficult to restore the data sets. There should be the accurate
provision of backup, and this will lay an impact on the organization accordingly. Moreover, the
managers have committed that these data loss sets back the process of productivity and it will
also lead to the loss of customer information. Therefore, it can be said that Syslog management
system helps to recover the lost data set and also in re-building the client information process
25
accordingly (Bonelli et al.2013). The cloud-based disaster recovery is considered as the most
effective way of saving the data from the disaster process. The security issues that are related
to the cloud-based Syslog management will help to check the entire system, and this will make
the communication process faster and easier. The cloud backup services will help to access the
information, and thus it will help in the smooth running of the business organization. There
should be the provision of extra security measures, and this will help in the identification of
information in a better way. Therefore, the effect of loss of data set will help in the installation of
the program settings, and it is necessary to be careful while carrying out the entire process in a
smooth way (Glykas and Khalid 2014).
8. Conclusion Critical Evaluation and Future Work
Therefore, it can be said that Syslog management has made it easier to view, collect and
archive the data from different locations. This will help to save the money of the management,
and thus necessary customizations can be made in order to fit into the data sets. The local
cloud server or the logging cloud system will help to accept the request, retrieve as well as
delete the authenticated data sets that are used by the management. On the other hand, in
order to delete the log system the logging cloud will pose the challenge to the requesters, and
thus it will help to present a delete tag. There should be evidence of proper provision, and this
will help in the provision of a local cloud system. The encryptions, as well as the log
applications, are generally generated through the encrypted file, and this will make it easier to
carry out the storage system. The complete system of a log will make it easier to record the
information on the cloud-based software, and thus it will help in the removal of information
accordingly. The projected comprehensive set of information will help to address different types
of security issues, and thus there will be a provision of alternative stages of evaluation used in
the entire project. This work on the automation process will help to carry out the log aggregation
that will be uploaded in the cloud server process. Therefore, this will affect the overhead
projected system to a large extent.
The provision of disaster recovery on the cloud enables the user to access the data, and thus
it will be easier to maintain the system as well as the other processes very easily. The users can
also upload as well as download the data using the secured based encryption process, and this
will help in the reduction of substantial cost of capital. There are provisions for a large number of
facilities, and this will make it easier to handle the data processing tools easily. On the other
hand, it is the responsibility of the management to upgrade the process, and this will lower the
expenses and the labour cost that has to be borne by the company. The disaster recovery on
the cloud will help in reducing the complexity of the disaster, and thus the enterprise must check
the robust performance level in comparison to the process of traditional infrastructure.
The future of height secured cloud-based Syslog management will help in cost reduction, and
thus it will make it easier to carry out the mapping requirements accordingly. There are a series
of decision points that have to be taken by the management of the organization, and this will
provide better provisions to deal with compliance as well as security issues. As there are
different types of obstacles in the cloud management system, there should be a proper
guarantee of customer data at the different point in time in the organization. The choice of
26
effective way of saving the data from the disaster process. The security issues that are related
to the cloud-based Syslog management will help to check the entire system, and this will make
the communication process faster and easier. The cloud backup services will help to access the
information, and thus it will help in the smooth running of the business organization. There
should be the provision of extra security measures, and this will help in the identification of
information in a better way. Therefore, the effect of loss of data set will help in the installation of
the program settings, and it is necessary to be careful while carrying out the entire process in a
smooth way (Glykas and Khalid 2014).
8. Conclusion Critical Evaluation and Future Work
Therefore, it can be said that Syslog management has made it easier to view, collect and
archive the data from different locations. This will help to save the money of the management,
and thus necessary customizations can be made in order to fit into the data sets. The local
cloud server or the logging cloud system will help to accept the request, retrieve as well as
delete the authenticated data sets that are used by the management. On the other hand, in
order to delete the log system the logging cloud will pose the challenge to the requesters, and
thus it will help to present a delete tag. There should be evidence of proper provision, and this
will help in the provision of a local cloud system. The encryptions, as well as the log
applications, are generally generated through the encrypted file, and this will make it easier to
carry out the storage system. The complete system of a log will make it easier to record the
information on the cloud-based software, and thus it will help in the removal of information
accordingly. The projected comprehensive set of information will help to address different types
of security issues, and thus there will be a provision of alternative stages of evaluation used in
the entire project. This work on the automation process will help to carry out the log aggregation
that will be uploaded in the cloud server process. Therefore, this will affect the overhead
projected system to a large extent.
The provision of disaster recovery on the cloud enables the user to access the data, and thus
it will be easier to maintain the system as well as the other processes very easily. The users can
also upload as well as download the data using the secured based encryption process, and this
will help in the reduction of substantial cost of capital. There are provisions for a large number of
facilities, and this will make it easier to handle the data processing tools easily. On the other
hand, it is the responsibility of the management to upgrade the process, and this will lower the
expenses and the labour cost that has to be borne by the company. The disaster recovery on
the cloud will help in reducing the complexity of the disaster, and thus the enterprise must check
the robust performance level in comparison to the process of traditional infrastructure.
The future of height secured cloud-based Syslog management will help in cost reduction, and
thus it will make it easier to carry out the mapping requirements accordingly. There are a series
of decision points that have to be taken by the management of the organization, and this will
provide better provisions to deal with compliance as well as security issues. As there are
different types of obstacles in the cloud management system, there should be a proper
guarantee of customer data at the different point in time in the organization. The choice of
26
security level will help in the management of the database, and this can be handled easily with
the resource management and the internal technical skills who are employed in the
organization.
The cloud-based system will help in the emergency management, and thus it will be easier
for the management to check with the employees and thus continue the process smoothly. This
will make it easier to recognize the virtual operation as well as the talent and thus it will be
easier for the individuals to carry out the task in a smooth way. The contracts file can be sorted
out in an orderly manner, and it will be easier for the vendors to get a copy of the files and the
other systems and processes included in it. There must be the provision of the proper
management system, and this will make it easier to defend the network from different types of
attacks. The audit reports of the vendors will make it easier to address the stability process, and
this will protect the application process. Therefore, it can be said that a good logging system will
help to pull out the critical events and this will make it easier to carry out the information in a
smooth way. The management must have the ability to manage the infrastructure process, and
thus it will help in the better provision and handling of the monitoring site.
27
the resource management and the internal technical skills who are employed in the
organization.
The cloud-based system will help in the emergency management, and thus it will be easier
for the management to check with the employees and thus continue the process smoothly. This
will make it easier to recognize the virtual operation as well as the talent and thus it will be
easier for the individuals to carry out the task in a smooth way. The contracts file can be sorted
out in an orderly manner, and it will be easier for the vendors to get a copy of the files and the
other systems and processes included in it. There must be the provision of the proper
management system, and this will make it easier to defend the network from different types of
attacks. The audit reports of the vendors will make it easier to address the stability process, and
this will protect the application process. Therefore, it can be said that a good logging system will
help to pull out the critical events and this will make it easier to carry out the information in a
smooth way. The management must have the ability to manage the infrastructure process, and
thus it will help in the better provision and handling of the monitoring site.
27
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
References
Amaratunga, D., Baldry, D., Sarshar, M. and Newton, R., 2002. Quantitative and qualitative
research in the built environment: application of “mixed” research approach. Work study, 51(1),
pp.17-31.
Angin, P., Bhargava, B., Ranchal, R., Singh, N., Linderman, M., Othmane, L.B. and Lilien, L.,
2010, October. An entity-centric approach to privacy and identity management in cloud
computing. In Reliable Distributed Systems, 2010 29th IEEE Symposium on (pp. 177-183).
IEEE.
Bonelli, L., Giudicianni, L., Immediata, A. and Luzzi, A., 2013. Compliance in the Cloud. In
Data Intensive Storage Services for Cloud Environments (pp. 109-131). IGI Global.
Chang, V., 2015. Towards a Big Data system disaster recovery in a Private Cloud. Ad Hoc
Networks, 35, pp.65-82.
Church, C., Golovinsky, E. and Govshteyn, M., Alert Logic Inc, 2012. Systems and methods for
correlating log messages into actionable security incidents and managing human responses.
U.S. Patent 8,156,553.
Duncan, B. and Whittington, M., 2016. Cloud cyber-security: Empowering the audit trail.
International Journal on Advances in Security Volume 9, Number 3 & 4, 2016.
Glykas, A. and Khalid, A., 2014. A Risk Based Approach to Logging and Retrieval of User
Data: Design and Implementation of a Remote Logging System using Action Design Research
(ADR).
Gregory, I., 2003. Ethics in research. A&C Black.
28
Amaratunga, D., Baldry, D., Sarshar, M. and Newton, R., 2002. Quantitative and qualitative
research in the built environment: application of “mixed” research approach. Work study, 51(1),
pp.17-31.
Angin, P., Bhargava, B., Ranchal, R., Singh, N., Linderman, M., Othmane, L.B. and Lilien, L.,
2010, October. An entity-centric approach to privacy and identity management in cloud
computing. In Reliable Distributed Systems, 2010 29th IEEE Symposium on (pp. 177-183).
IEEE.
Bonelli, L., Giudicianni, L., Immediata, A. and Luzzi, A., 2013. Compliance in the Cloud. In
Data Intensive Storage Services for Cloud Environments (pp. 109-131). IGI Global.
Chang, V., 2015. Towards a Big Data system disaster recovery in a Private Cloud. Ad Hoc
Networks, 35, pp.65-82.
Church, C., Golovinsky, E. and Govshteyn, M., Alert Logic Inc, 2012. Systems and methods for
correlating log messages into actionable security incidents and managing human responses.
U.S. Patent 8,156,553.
Duncan, B. and Whittington, M., 2016. Cloud cyber-security: Empowering the audit trail.
International Journal on Advances in Security Volume 9, Number 3 & 4, 2016.
Glykas, A. and Khalid, A., 2014. A Risk Based Approach to Logging and Retrieval of User
Data: Design and Implementation of a Remote Logging System using Action Design Research
(ADR).
Gregory, I., 2003. Ethics in research. A&C Black.
28
Guster, D., Safonov, P. and Hathaway, A., 2014. USING LAYERING TO ENHANCE THE
SECURITY OF AN E-COMMERCE SYSTEM DESIGNED TO SUPPORT GLOBAL
BUSINESS. Issues in Information Systems, 15(2).
Holland, R.C., Stickle, T.C., LaFever, M.G. and Mullins, E.S., Amazon Technologies Inc and
Nasdaq Inc, 2016. Systems and methods for secure and persistent retention of sensitive
information. U.S. Patent 9,424,432.
Holt, J., 2009. Quantitative research: An overview. British Journal of Cardiac Nursing, 4(5),
pp.234-236.
Iyer, S.R., Hoy, J.R., Kapadia, K.K., Muthukrishnan, R.K. and Nagaratnam, N., International
Business Machines Corp, 2017. Application self-service for assured log management in cloud
environments. U.S. Patent 9,578,063.
Kailash, K., Balaiah, C.P., Pangeni, S., Sinha, A., Crank, S.J., Apte, M. and Narasimhan, S.,
Zscaler Inc, 2018. Systems and methods for integrating cloud services with information
management systems. U.S. Patent 9,912,638.
Kelsey, J., Callas, J., and Clemm, A., 2010. Signed syslog messages (No. RFC 5848).
Kolhe, H.N., and Shaikh, I.R. 2018, Design of Secure Log Management Over Cloud.
Kothari, C.R., 2004. Research methodology: Methods and techniques. New Age International.
Kumar, S. and Phrommathed, P., 2005. Research methodology (pp. 43-50). Springer US.
Lee, J.H., Park, M.W., Eom, J.H. and Chung, T.M., 2011, February. Multi-level intrusion
detection system and log management in cloud computing. In Advanced Communication
Technology (ICACT), 2011 13th International Conference on (pp. 552-555). IEEE.
Lehner, W., Sattler, K.U. and Sattler, K.U., 2013. Web-scale data management for the
cloud (Vol. 5). Berlin: Springer.
29
SECURITY OF AN E-COMMERCE SYSTEM DESIGNED TO SUPPORT GLOBAL
BUSINESS. Issues in Information Systems, 15(2).
Holland, R.C., Stickle, T.C., LaFever, M.G. and Mullins, E.S., Amazon Technologies Inc and
Nasdaq Inc, 2016. Systems and methods for secure and persistent retention of sensitive
information. U.S. Patent 9,424,432.
Holt, J., 2009. Quantitative research: An overview. British Journal of Cardiac Nursing, 4(5),
pp.234-236.
Iyer, S.R., Hoy, J.R., Kapadia, K.K., Muthukrishnan, R.K. and Nagaratnam, N., International
Business Machines Corp, 2017. Application self-service for assured log management in cloud
environments. U.S. Patent 9,578,063.
Kailash, K., Balaiah, C.P., Pangeni, S., Sinha, A., Crank, S.J., Apte, M. and Narasimhan, S.,
Zscaler Inc, 2018. Systems and methods for integrating cloud services with information
management systems. U.S. Patent 9,912,638.
Kelsey, J., Callas, J., and Clemm, A., 2010. Signed syslog messages (No. RFC 5848).
Kolhe, H.N., and Shaikh, I.R. 2018, Design of Secure Log Management Over Cloud.
Kothari, C.R., 2004. Research methodology: Methods and techniques. New Age International.
Kumar, S. and Phrommathed, P., 2005. Research methodology (pp. 43-50). Springer US.
Lee, J.H., Park, M.W., Eom, J.H. and Chung, T.M., 2011, February. Multi-level intrusion
detection system and log management in cloud computing. In Advanced Communication
Technology (ICACT), 2011 13th International Conference on (pp. 552-555). IEEE.
Lehner, W., Sattler, K.U. and Sattler, K.U., 2013. Web-scale data management for the
cloud (Vol. 5). Berlin: Springer.
29
Lemoudden, M., 2017. Managing the Logs of Cloud Computing Systems Using Big Data
Techniques.
Linnakangas, T., Teiste, M., Huima, A. and Ylonen, T.J., SSH Communications Security Oy,
2017. Trust Relationships in a Computerized System. U.S. Patent Application 15/423,830.
Newman, I. and Benz, C.R., 1998. Qualitative-quantitative research methodology: Exploring the
interactive continuum. SIU Press.
O'Brien, G., O'Keefe, P., Rose, J. and Wisner, B., 2006. Climate change and disaster
management. Disasters, 30(1), pp.64-80.
Okmianski, A., 2009. Transmission of syslog Messages over UDP (No. RFC 5426).
Pakes, A. and Schankerman, M., 1984. The rate of obsolescence of patents, research gestation
lags, and the private rate of return to research resources. In R&D, patents, and productivity (pp.
73-88). University of Chicago Press.
Patawari, A., 2013. Getting started with ownCloud. Packt Publishing Ltd.
Prasad, M.R., Sharath, V., Nagendra, G., Reddy, K.D. and Sridhar, V., 2012. Research Method
to Optimizse Logger for Telecom Application Running on Embedded System. International
Journal of Engineering Research and Development, 1(6), pp.01-09.
Ray, I., Belyaev, K., Strizhov, M., Mulamba, D. and Rajaram, M., 2013. Secure logging as a
service—delegating log management to the cloud. IEEE systems journal, 7(2), pp.323-334.
Resnik, D.B., 2011. What is ethics in research & why is it important. National Institute of
Environmental Health Sciences, pp.1-10.
Ruha, T., 2018. Cybersecurity of Computer Networks.
30
Techniques.
Linnakangas, T., Teiste, M., Huima, A. and Ylonen, T.J., SSH Communications Security Oy,
2017. Trust Relationships in a Computerized System. U.S. Patent Application 15/423,830.
Newman, I. and Benz, C.R., 1998. Qualitative-quantitative research methodology: Exploring the
interactive continuum. SIU Press.
O'Brien, G., O'Keefe, P., Rose, J. and Wisner, B., 2006. Climate change and disaster
management. Disasters, 30(1), pp.64-80.
Okmianski, A., 2009. Transmission of syslog Messages over UDP (No. RFC 5426).
Pakes, A. and Schankerman, M., 1984. The rate of obsolescence of patents, research gestation
lags, and the private rate of return to research resources. In R&D, patents, and productivity (pp.
73-88). University of Chicago Press.
Patawari, A., 2013. Getting started with ownCloud. Packt Publishing Ltd.
Prasad, M.R., Sharath, V., Nagendra, G., Reddy, K.D. and Sridhar, V., 2012. Research Method
to Optimizse Logger for Telecom Application Running on Embedded System. International
Journal of Engineering Research and Development, 1(6), pp.01-09.
Ray, I., Belyaev, K., Strizhov, M., Mulamba, D. and Rajaram, M., 2013. Secure logging as a
service—delegating log management to the cloud. IEEE systems journal, 7(2), pp.323-334.
Resnik, D.B., 2011. What is ethics in research & why is it important. National Institute of
Environmental Health Sciences, pp.1-10.
Ruha, T., 2018. Cybersecurity of Computer Networks.
30
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Sahebjamnia, N., Torabi, S.A. and Mansouri, S.A., 2015. Integrated business continuity and
disaster recovery planning: Towards organizational resilience. European Journal of Operational
Research, 242(1), pp.261-273.
Song, S., Hong, S., Guan, X., Choi, B.Y. and Choi, C., 2013, May. NEOD: network embedded
on-line disaster management framework for software defined networking. In Integrated Network
Management (IM 2013), 2013 IFIP/IEEE International Symposium on (pp. 492-498). IEEE.
Thakur, P. (2015). Disasters cost India $10bn per year: UN report - Times of India. [online] The
Times of India. Available at: https://timesofindia.indiatimes.com/india/Disasters-cost-India-
10bn-per-year-UN-report/articleshow/46522526.cms [Accessed 4 Aug. 2018].
Thottan, M. and Ji, C., Rensselaer Polytechnic Institute, 2004. Fault detection and prediction for
management of computer networks. U.S. Patent Application 10/433,459.
Waichal, S. and Meshram, B.B., 2013. Router attacks-detection and defense
mechanisms. International Journal of Scientific & Technology Research, 2(6).
Ylonen, T., Scarfone, K., and Souppaya, M., 2014. Security of Automated Access Management
Using Secure Shell (SSH).
31
disaster recovery planning: Towards organizational resilience. European Journal of Operational
Research, 242(1), pp.261-273.
Song, S., Hong, S., Guan, X., Choi, B.Y. and Choi, C., 2013, May. NEOD: network embedded
on-line disaster management framework for software defined networking. In Integrated Network
Management (IM 2013), 2013 IFIP/IEEE International Symposium on (pp. 492-498). IEEE.
Thakur, P. (2015). Disasters cost India $10bn per year: UN report - Times of India. [online] The
Times of India. Available at: https://timesofindia.indiatimes.com/india/Disasters-cost-India-
10bn-per-year-UN-report/articleshow/46522526.cms [Accessed 4 Aug. 2018].
Thottan, M. and Ji, C., Rensselaer Polytechnic Institute, 2004. Fault detection and prediction for
management of computer networks. U.S. Patent Application 10/433,459.
Waichal, S. and Meshram, B.B., 2013. Router attacks-detection and defense
mechanisms. International Journal of Scientific & Technology Research, 2(6).
Ylonen, T., Scarfone, K., and Souppaya, M., 2014. Security of Automated Access Management
Using Secure Shell (SSH).
31
Bibliography
He, J. and Bhattacharya, P., Fortinet Inc, 2018. Adaptive allocation for dynamic reporting rates
of log events to a central log management server from distributed nodes in a high volume log
management system. U.S. Patent Application 15/277,965.
He, J. and Bhattacharya, P., Fortinet Inc, 2018. Adaptive allocation for dynamic reporting rates
of log events to a central log management server from distributed nodes in a high volume log
management system. U.S. Patent Application 10/044,578.
Iwasaki, N., Katori, K., Masuda, K., Nohta, T. and Swingler, J.M., International Business
Machines Corp, 2016. Flash copy for disaster recovery (DR) testing. U.S. Patent 9,262,290.
Iwasaki, N., Katori, K., Masuda, K., Nohta, T. and Swingler, J.M., International Business
Machines Corp, 2016. Flash copy for disaster recovery (dr) testing. U.S. Patent Application
15/006,931.
Le Brocque, R., De Young, A., Montague, G., Pocock, S., March, S., Triggell, N., Rabaa, C. and
Kenardy, J., 2017. Schools and natural disaster recovery: the unique and vital role that teachers
and education professionals play in ensuring the mental health of students following natural
disasters. Journal of psychologists and counsellors in schools, 27(1), pp.1-23.
Marin, A., Bodin, Ö., Gelcich, S., and Crona, B., 2015. Social capital in post-disaster recovery
trajectories: Insights from a longitudinal study of tsunami-impacted small-scale fisher
organizations in Chile. Global Environmental Change, 35, pp.450-462.
Parab, N., NetApp Inc, 2016. Cloud-based disaster recovery of backup data and metadata. U.S.
Patent 9,501,365.
32
He, J. and Bhattacharya, P., Fortinet Inc, 2018. Adaptive allocation for dynamic reporting rates
of log events to a central log management server from distributed nodes in a high volume log
management system. U.S. Patent Application 15/277,965.
He, J. and Bhattacharya, P., Fortinet Inc, 2018. Adaptive allocation for dynamic reporting rates
of log events to a central log management server from distributed nodes in a high volume log
management system. U.S. Patent Application 10/044,578.
Iwasaki, N., Katori, K., Masuda, K., Nohta, T. and Swingler, J.M., International Business
Machines Corp, 2016. Flash copy for disaster recovery (DR) testing. U.S. Patent 9,262,290.
Iwasaki, N., Katori, K., Masuda, K., Nohta, T. and Swingler, J.M., International Business
Machines Corp, 2016. Flash copy for disaster recovery (dr) testing. U.S. Patent Application
15/006,931.
Le Brocque, R., De Young, A., Montague, G., Pocock, S., March, S., Triggell, N., Rabaa, C. and
Kenardy, J., 2017. Schools and natural disaster recovery: the unique and vital role that teachers
and education professionals play in ensuring the mental health of students following natural
disasters. Journal of psychologists and counsellors in schools, 27(1), pp.1-23.
Marin, A., Bodin, Ö., Gelcich, S., and Crona, B., 2015. Social capital in post-disaster recovery
trajectories: Insights from a longitudinal study of tsunami-impacted small-scale fisher
organizations in Chile. Global Environmental Change, 35, pp.450-462.
Parab, N., NetApp Inc, 2016. Cloud-based disaster recovery of backup data and metadata. U.S.
Patent 9,501,365.
32
Yang, C.L., Yuan, B., and Huang, C.Y., 2015. Key determinant derivations for information
technology disaster recovery site selection by the multi-criterion decision making
method. Sustainability, 7(5), pp.6149-6188.
33
technology disaster recovery site selection by the multi-criterion decision making
method. Sustainability, 7(5), pp.6149-6188.
33
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Appendices
QUESTIONNAIRE
Tick the chosen option in the box below:
1. Do you use disaster recovery sites for managing your data or important log?
Yes No Neutral
2. Are you aware of cloud based syslog disaster management?
Yes No Neutral
3. Do you think syslog management is crucial for the company to get saved from disaster?
Yes No Neutral
4. Is the company involved in natural disaster recovery planning?
Yes No Neutral
5. Are your company prone to natural or man-mad disaster?
Yes No Neutral
6. Is your management conducting a risk assessment for any negative situation?
Yes No Neutral
7. What kind of disaster have you faced over the time in your business?
Natural Disaster Man-made Disaster Both
34
QUESTIONNAIRE
Tick the chosen option in the box below:
1. Do you use disaster recovery sites for managing your data or important log?
Yes No Neutral
2. Are you aware of cloud based syslog disaster management?
Yes No Neutral
3. Do you think syslog management is crucial for the company to get saved from disaster?
Yes No Neutral
4. Is the company involved in natural disaster recovery planning?
Yes No Neutral
5. Are your company prone to natural or man-mad disaster?
Yes No Neutral
6. Is your management conducting a risk assessment for any negative situation?
Yes No Neutral
7. What kind of disaster have you faced over the time in your business?
Natural Disaster Man-made Disaster Both
34
8. Was your business able to recover the impact on data center and from data loss?
Yes No Neutral
9. Are you prepared by your kind of disaster recovery strategies and equipment?
Yes No Neutral
10. What kind of disaster recovery site do you use for your business?
Internal DR External DR Cloud DR Mobile DR
11. Do you think cloud based disaster recovery site is an effective way to save your data from
disaster?
Yes No Neutral
12. Do you think there is a security issue related to cloud based syslog disaster management?
Yes No Neutral
13. Is communication is better for cloud based technology?
Yes No Neutral
14. Does cloud disaster recovery heled in case of wide reaching disaster?
Yes No Neutral
15. Do you think saving data backup in the cloud can secure it and is out of reach of any potential
natural disaster?
Yes No Neutral
35
Yes No Neutral
9. Are you prepared by your kind of disaster recovery strategies and equipment?
Yes No Neutral
10. What kind of disaster recovery site do you use for your business?
Internal DR External DR Cloud DR Mobile DR
11. Do you think cloud based disaster recovery site is an effective way to save your data from
disaster?
Yes No Neutral
12. Do you think there is a security issue related to cloud based syslog disaster management?
Yes No Neutral
13. Is communication is better for cloud based technology?
Yes No Neutral
14. Does cloud disaster recovery heled in case of wide reaching disaster?
Yes No Neutral
15. Do you think saving data backup in the cloud can secure it and is out of reach of any potential
natural disaster?
Yes No Neutral
35
16. Is the cloud based syslog management more appropriate only in the case of small companies?
Yes No Neutral
17. Are you planning to use cloud based disaster management technology in the near future as
well?
Yes No Neutral
18. Do you think that big data can be easily floated in the cloud than in any other type of disaster
recovery sites?
Yes No Neutral
19. Are there any errors received in the cloud server while saving or transporting the data in cloud
DR sites?
Yes No Neutral
20. Is your cloud based disaster recovery site near or far away from the actual data site?
Near Far
36
Yes No Neutral
17. Are you planning to use cloud based disaster management technology in the near future as
well?
Yes No Neutral
18. Do you think that big data can be easily floated in the cloud than in any other type of disaster
recovery sites?
Yes No Neutral
19. Are there any errors received in the cloud server while saving or transporting the data in cloud
DR sites?
Yes No Neutral
20. Is your cloud based disaster recovery site near or far away from the actual data site?
Near Far
36
1 out of 46
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.