(solution) SEC 435 Week 10 Discussion "Malware Detection and Prevention and

(solution) SEC 435 Week 10 Discussion "Malware Detection and Prevention and

SEC 435 Week 10 Discussion

“Malware Detection and Prevention and Log Management”  Please respond to the following:

  • Discuss three (3) methods of safe computing to help in the prevention of Virus and Trojan attacks.  Present the basic technical knowledge that a layman would need in order to use the methods you identified.
  • Explain the exact steps you would take when securing log data. Contrast log generation / management in Windows (i.e. XP, Windows7, Server2008) versus Linux (i.e. Redhat, Ubuntu, Fedora).