The devices designed for the purpose of addressing security inthe network generate a number of logs during the continuousmonitoring of the network. Discuss in detail the different types oflogs created and how the security professional can use thisinformation for analysing security in the network