Explore BrainMass
Share

Explore BrainMass

    Historical and Statistical Logging, File Security and Firewalls

    This content was COPIED from BrainMass.com - View the original, and get the already-completed solution here!

    I need the following explained in about 2 paragraphs each the difference between the each of these entities.
    @ Historical and statistical logging
    @ File security and firewalls
    @ Secret and public keys
    @ Symmetric and asymmetric keys
    @ Digital certificate and digital postmark

    © BrainMass Inc. brainmass.com October 9, 2019, 8:33 pm ad1c9bdddf
    https://brainmass.com/computer-science/file-systems/historical-statistical-logging-file-security-firewalls-154997

    Solution Preview

    1. Historical and statistical logging

    Statistical Logging:
    Logging involves having the computer automatically collect statistics about the detailed use of the system. It is useful because it shows how users perform their actual work and also because it is easy to automatically collect data from a large number of users working under different circumstances. Typically, an interface log will contain statistics about the frequency with which each user has used each feature in the program and the frequency with which various events of interest (such as error messages) have occurred. Statistics showing the frequency of use of commands and other system features can be used to optimize frequently used features and to identify the features that are rarely used or not used. Statistics showing the frequency of various error situations and the use of online help can be used to improve the usability of future releases of the system by redesigning the features causing the most errors and most access for online help. This technique can be used at the test or deployment stages of software development.
    Historical logging:
    Logging is usually achieved either by incrementing low-level parts of the system software, such as keyboard and mouse drivers, or by modifying the software of interest. Such logging is called historical logging. The latter is much preferred, since it makes it easier to log events of interest. If the only available data is raw input and output, it becomes much harder to analyze the higher-level events of interest for system usability, such as feature use or error situations.
    If the instrumented system runs on a mainframe or on workstations with a shared file space, it is easy to collect logging data by simply copying the log files from each user at regular intervals. Otherwise, it may be necessary to collect log data through electronic mail -- either automatically or by asking the users to periodically run a small script that sends off the log file. Or, the logs may be collected by going around to the users and copying floppies.
    In addition to statistical use of logging data, it is also possible to log complete transcripts of user sessions either for use in later playback or for analysis of patterns of use, such as what commands are issued next after an error situation.
    A final use of logging data is to study the user's detailed use of a user interface to find usability problems that may not be apparent when observing users. The logging data can vividly show the statistics of one action (e.g. clicking on an object) from many users by integrating the logging data with the user interface.
    Since the logging data only shows what the users did but not why they did it. It would be better to combine logging with other methods such as interviews, where users are shown data about their own use of the system and asked to explain their activities.

    2. File security and firewalls

    File Security:

    File security is usually achieved by mounting files over a secure system. A typical example of that is the Network File System (NFS).

    A Network File System (NFS) allows remote hosts to mount file systems over a network and interact with those file systems as though they are mounted locally. This enables system administrators to consolidate resources onto centralized servers on the network.

    This is how files are secured over the NFS.

    Currently, there are three versions of NFS. NFS version 2 (NFSv2) is older and is widely supported. NFS version 3 (NFSv3) has more features, including variable size file handling and better error reporting, but is not fully compatible with NFSv2 clients. NFS version 4 (NFSv4) includes Kerberos security, works through firewalls and on the Internet, no longer requires portmapper, supports ACLs, and utilizes stateful operations. Red Hat Enterprise Linux supports NFSv2, NFSv3, and NFSv4 clients, and when mounting a file system via NFS, Red Hat Enterprise Linux uses NFSv4 by default, if the server supports it.

    All versions of NFS can use Transmission Control Protocol (TCP) running over an IP network, with NFSv4 requiring it. NFSv2 and NFSv3 can use the User Datagram Protocol (UDP) running over an IP network to provide a stateless network connection between the client and server.

    When using NFSv2 or NFSv3 with UDP, the stateless UDP connection ...

    Solution Summary

    Historical and Statistical Logging, File Security and Firewalls, Secret and Public Keys.

    $2.19