KINGSTON UNIVERSITYFACULTY OF ENGINEERING AND COMPUTINGSchool of ComputingMSc. DEGREEIN<State your specialization >Name: <Student Name>ID Number: <Student ID>Project Title: Highly Secured Cloud-Based Syslog Disaster Managementand Disaster Recovery Site with Encrypted Log DataSupervisor: <Supervisor Name>Date: <Date of Submission>
WARRANTY STATEMENTThe information provided are well researched and reliable to be considered as true in the realcontext. i
DeclarationI, (name of the student), confirm that the research work on the topic “Highly Secured Cloud-Based Syslog Disaster Management and Disaster Recovery Site with Encrypted Log Data” hasbeen solely done by me, and no help was provided to me in regards to the formation of theobjective and the entire idea of the research. Some help was taken from the participants to collectdata and from the university to get the internet connection. The work taken from papers of otherauthors has been referenced and has supported by thesis. 24.09.2018 (name of the student)ii
Acknowledgement The research has been supported successfully by (Name of the University). I thank my teachersand professors for guiding me with their expertise that helped me in getting a keen insight intothe research, although some of the thoughts implemented in the paper are my own. I thank myuniversity for providing me with the internet connection and allowing me to carry out the surveyin an effective manner so that the result can be generated. I also put special gratitude to theparticipants that participated in the survey and helped me in obtaining a specific outcome of theresearch. The entire research was a summative outcome of the help that I received from variouspeople and departments. iii
iv
AbstractThe aim of the paper was to analyze the effectiveness and use of cloud-based syslog disastermanagement and disaster recovery site from all the disaster recovery sites that are present.Syslog management is stated as the way to manage data and information in the company andprotecting it during disasters. The research followed the qualitative research methodology andalso the primary and secondary methodology for collecting data. Data from both the methodshave been gathered and evaluated in a systematic manner. The result from the findings showedthat cloud-based Syslog management is the most effective disaster recovery site that a companycan use to save its data from disaster, both natural and man-made.v
Table of Contents1.0 Introduction............................................................................................................................11.1 Prolegomena......................................................................................................................11.2 Aim and Objectives............................................................................................................11.2.1 Aim...............................................................................................................................11.2.2 Objectives......................................................................................................................21.3 Background and Motivation................................................................................................21.4 Problem in brief..................................................................................................................31.5 Proposed Solution..............................................................................................................31.6 Structure of the Thesis.......................................................................................................31.7 Summary............................................................................................................................42. Literature Review.....................................................................................................................52.1 Introduction........................................................................................................................52.2 Syslog Management System and Benefits.........................................................................52.3 Practices to be maintained in Log management.................................................................62.4 Syslog Management using Cloud-Based Platform.............................................................72.4 Disaster Recovery Sites with Encrypted Log......................................................................82.5 Future trends......................................................................................................................82.6 Problem definition..............................................................................................................92.7 Summary............................................................................................................................93. Technology............................................................................................................................103.1 Research Design..............................................................................................................103.2 Work Plan.........................................................................................................................103.3 Research Approach..........................................................................................................103.4 Research Philosophy.......................................................................................................113.5 Data collection method.....................................................................................................113.6 Sampling method and size...............................................................................................123.7 Data analysis method.......................................................................................................123.8 Research Ethics...............................................................................................................124. Design...................................................................................................................................135. Approach...............................................................................................................................146. Implementation......................................................................................................................156.1 Module 1 and 2: Primary and Secondary data collection..................................................16vi