“Malware Detection and Prevention and Log Management” Please respond to the following:
Discuss three (3) methods of safe computing to help in the prevention of Virus and Trojan attacks. Present the basic technical knowledge that a layman would need in order to use the methods you identified.
Explain the exact steps you would take when securing log data. Contrast log generation / management in Windows (i.e. XP, Windows7, Server2008) versus Linux (i.e. Redhat, Ubuntu, Fedora).