Purchase Solution

Historical and Statistical Logging, File Security and Firewalls

Not what you're looking for?

Ask Custom Question

I need the following explained in about 2 paragraphs each the difference between the each of these entities.
@ Historical and statistical logging
@ File security and firewalls
@ Secret and public keys
@ Symmetric and asymmetric keys
@ Digital certificate and digital postmark

Purchase this Solution

Solution Summary

Historical and Statistical Logging, File Security and Firewalls, Secret and Public Keys.

Solution Preview

1. Historical and statistical logging

Statistical Logging:
Logging involves having the computer automatically collect statistics about the detailed use of the system. It is useful because it shows how users perform their actual work and also because it is easy to automatically collect data from a large number of users working under different circumstances. Typically, an interface log will contain statistics about the frequency with which each user has used each feature in the program and the frequency with which various events of interest (such as error messages) have occurred. Statistics showing the frequency of use of commands and other system features can be used to optimize frequently used features and to identify the features that are rarely used or not used. Statistics showing the frequency of various error situations and the use of online help can be used to improve the usability of future releases of the system by redesigning the features causing the most errors and most access for online help. This technique can be used at the test or deployment stages of software development.
Historical logging:
Logging is usually achieved either by incrementing low-level parts of the system software, such as keyboard and mouse drivers, or by modifying the software of interest. Such logging is called historical logging. The latter is much preferred, since it makes it easier to log events of interest. If the only available data is raw input and output, it becomes much harder to analyze the higher-level events of interest for system usability, such as feature use or error situations.
If the instrumented system runs on a mainframe or on workstations with a shared file space, it is easy to collect logging data by simply copying the log files from each user at regular intervals. Otherwise, it may be necessary to collect log data through electronic mail -- either automatically or by asking the users to periodically run a small script that sends off the log file. Or, the logs may be collected by going around to the users and copying floppies.
In addition to statistical use of logging data, it is also possible to log complete transcripts of user sessions either for use in later playback or for analysis of patterns of use, such as what commands are issued next after an error situation.
A final use of logging data is to study the user's detailed use of a user interface to find usability problems that may not be apparent when observing users. The logging data can vividly show the statistics of one action (e.g. clicking on an object) from many users by integrating the logging data with the user interface.
Since the logging data only shows what the users did but not why they did it. It would be better to combine logging with other methods such as interviews, where users are shown data about their own use of the system and asked to explain their activities.

2. File security and firewalls

File Security:

File security is usually achieved by mounting files over a secure system. A typical example of that is the Network File System (NFS).

A Network File System (NFS) allows remote hosts to mount file systems over a network and interact with those file systems as though they are mounted locally. This enables system administrators to consolidate resources onto centralized servers on the network.

This is how files are secured over the NFS.

Currently, there are three versions of NFS. NFS version 2 (NFSv2) is older and is widely supported. NFS version 3 (NFSv3) has more features, including variable size file handling and better error reporting, but is not fully compatible with NFSv2 clients. NFS version 4 (NFSv4) includes Kerberos security, works through firewalls and on the Internet, no longer requires portmapper, supports ACLs, and utilizes stateful operations. Red Hat Enterprise Linux supports NFSv2, NFSv3, and NFSv4 clients, and when mounting a file system via NFS, Red Hat Enterprise Linux uses NFSv4 by default, if the server supports it.

All versions of NFS can use Transmission Control Protocol (TCP) running over an IP network, with NFSv4 requiring it. NFSv2 and NFSv3 can use the User Datagram Protocol (UDP) running over an IP network to provide a stateless network connection between the client and server.

When using NFSv2 or NFSv3 with UDP, the stateless UDP connection ...

Purchase this Solution


Free BrainMass Quizzes
Java loops

This quiz checks your knowledge of for and while loops in Java. For and while loops are essential building blocks for all Java programs. Having a solid understanding of these constructs is critical for success in programming Java.

C# variables and classes

This quiz contains questions about C# classes and variables.

Inserting and deleting in a linked list

This quiz tests your understanding of how to insert and delete elements in a linked list. Understanding of the use of linked lists, and the related performance aspects, is an important fundamental skill of computer science data structures.

Basic UNIX commands

Use this quiz to check your knowledge of a few common UNIX commands. The quiz covers some of the most essential UNIX commands and their basic usage. If you can pass this quiz then you are clearly on your way to becoming an effective UNIX command line user.

Basic Networking Questions

This quiz consists of some basic networking questions.