Ask a question from expert

Ask now

Highly Secured Cloud-Based Syslog Disaster Management

46 Pages13398 Words223 Views
   

Added on  2019-10-18

Highly Secured Cloud-Based Syslog Disaster Management

   Added on 2019-10-18

BookmarkShareRelated Documents
KINGSTON UNIVERSITYFACULTY OF ENGINEERING AND COMPUTINGSchool of ComputingMSc. DEGREEIN<State your specialization >Name: <Student Name>ID Number: <Student ID>Project Title: Highly Secured Cloud-Based Syslog Disaster Managementand Disaster Recovery Site with Encrypted Log DataSupervisor: <Supervisor Name>Date: <Date of Submission>
Highly Secured Cloud-Based Syslog Disaster Management_1
WARRANTY STATEMENTThe information provided are well researched and reliable to be considered as true in the realcontext. i
Highly Secured Cloud-Based Syslog Disaster Management_2
DeclarationI, (name of the student), confirm that the research work on the topic Highly Secured Cloud-Based Syslog Disaster Management and Disaster Recovery Site with Encrypted Log Data hasbeen solely done by me, and no help was provided to me in regards to the formation of theobjective and the entire idea of the research. Some help was taken from the participants to collectdata and from the university to get the internet connection. The work taken from papers of otherauthors has been referenced and has supported by thesis. 24.09.2018 (name of the student)ii
Highly Secured Cloud-Based Syslog Disaster Management_3
Acknowledgement The research has been supported successfully by (Name of the University). I thank my teachersand professors for guiding me with their expertise that helped me in getting a keen insight intothe research, although some of the thoughts implemented in the paper are my own. I thank myuniversity for providing me with the internet connection and allowing me to carry out the surveyin an effective manner so that the result can be generated. I also put special gratitude to theparticipants that participated in the survey and helped me in obtaining a specific outcome of theresearch. The entire research was a summative outcome of the help that I received from variouspeople and departments. iii
Highly Secured Cloud-Based Syslog Disaster Management_4
iv
Highly Secured Cloud-Based Syslog Disaster Management_5
AbstractThe aim of the paper was to analyze the effectiveness and use of cloud-based syslog disastermanagement and disaster recovery site from all the disaster recovery sites that are present.Syslog management is stated as the way to manage data and information in the company andprotecting it during disasters. The research followed the qualitative research methodology andalso the primary and secondary methodology for collecting data. Data from both the methodshave been gathered and evaluated in a systematic manner. The result from the findings showedthat cloud-based Syslog management is the most effective disaster recovery site that a companycan use to save its data from disaster, both natural and man-made.v
Highly Secured Cloud-Based Syslog Disaster Management_6
Table of Contents1.0 Introduction............................................................................................................................11.1 Prolegomena......................................................................................................................11.2 Aim and Objectives............................................................................................................11.2.1 Aim...............................................................................................................................11.2.2 Objectives......................................................................................................................21.3 Background and Motivation................................................................................................21.4 Problem in brief..................................................................................................................31.5 Proposed Solution..............................................................................................................31.6 Structure of the Thesis.......................................................................................................31.7 Summary............................................................................................................................42. Literature Review.....................................................................................................................52.1 Introduction........................................................................................................................52.2 Syslog Management System and Benefits.........................................................................52.3 Practices to be maintained in Log management.................................................................62.4 Syslog Management using Cloud-Based Platform.............................................................72.4 Disaster Recovery Sites with Encrypted Log......................................................................82.5 Future trends......................................................................................................................82.6 Problem definition..............................................................................................................92.7 Summary............................................................................................................................93. Technology............................................................................................................................103.1 Research Design..............................................................................................................103.2 Work Plan.........................................................................................................................103.3 Research Approach..........................................................................................................103.4 Research Philosophy.......................................................................................................113.5 Data collection method.....................................................................................................113.6 Sampling method and size...............................................................................................123.7 Data analysis method.......................................................................................................123.8 Research Ethics...............................................................................................................124. Design...................................................................................................................................135. Approach...............................................................................................................................146. Implementation......................................................................................................................156.1 Module 1 and 2: Primary and Secondary data collection..................................................16vi
Highly Secured Cloud-Based Syslog Disaster Management_7
6.2 Module 3- Findings...........................................................................................................166.3 Module 4- Evaluation........................................................................................................236.4 Module 5- Conclusion.......................................................................................................237. Evaluation..............................................................................................................................238. Conclusion Critical Evaluation and Future Work....................................................................26References................................................................................................................................28Bibliography...............................................................................................................................32Appendices................................................................................................................................33vii
Highly Secured Cloud-Based Syslog Disaster Management_8

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Disaster Management System PDF
|19
|5462
|251

Highly Secured Cloud Based Syslog Disaster Management and Disaster Recovery Site with Encrypted Log
|19
|5462
|148

Assignment On Technology In Disaster Management
|6
|1618
|41

Paper | Highly Secured Cloud Based Syslog Disaster Management System
|19
|5470
|212

Disaster Recovery on Cloud Computing
|23
|4826
|48

Cloud Computing in Financial Sector: Current Security, Privacy Issues and its Solutions
|46
|14528
|272