International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 147 - Number 5 |
Year of Publication: 2016 |
Authors: Sweta Singh, Prashant Shukla |
10.5120/ijca2016911097 |
Sweta Singh, Prashant Shukla . Optimal Approaches for Securing Log Files for Forensic Analysis: A Survey. International Journal of Computer Applications. 147, 5 ( Aug 2016), 27-29. DOI=10.5120/ijca2016911097
The log file of any association may include sensitive data which must be protected properly for suitable working of that organization. Maintaining security of such log records is one of the important tasks. Also, over a long period of time maintaining authenticity of such log data is very important. However, deploying such a system for security of log records is a big task for any company and also it needs additional cost. There are many techniques have been proposed so far to secure log records. This paper presents a brief survey of optimal approaches for securing log files for forensic analysis. These techniques are reviewed considering its pros and cons.