International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 147 - Issue 5 |
Published: Aug 2016 |
Authors: Sweta Singh, Prashant Shukla |
![]() |
Sweta Singh, Prashant Shukla . Optimal Approaches for Securing Log Files for Forensic Analysis: A Survey. International Journal of Computer Applications. 147, 5 (Aug 2016), 27-29. DOI=10.5120/ijca2016911097
@article{ 10.5120/ijca2016911097, author = { Sweta Singh,Prashant Shukla }, title = { Optimal Approaches for Securing Log Files for Forensic Analysis: A Survey }, journal = { International Journal of Computer Applications }, year = { 2016 }, volume = { 147 }, number = { 5 }, pages = { 27-29 }, doi = { 10.5120/ijca2016911097 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2016 %A Sweta Singh %A Prashant Shukla %T Optimal Approaches for Securing Log Files for Forensic Analysis: A Survey%T %J International Journal of Computer Applications %V 147 %N 5 %P 27-29 %R 10.5120/ijca2016911097 %I Foundation of Computer Science (FCS), NY, USA
The log file of any association may include sensitive data which must be protected properly for suitable working of that organization. Maintaining security of such log records is one of the important tasks. Also, over a long period of time maintaining authenticity of such log data is very important. However, deploying such a system for security of log records is a big task for any company and also it needs additional cost. There are many techniques have been proposed so far to secure log records. This paper presents a brief survey of optimal approaches for securing log files for forensic analysis. These techniques are reviewed considering its pros and cons.