Audit trails observe system action making sure that when a security breach takes place, the mechanism and extent from the breach can be decided. Storing audit trails remotely, where by they are able to only be appended to, can retain intruders from masking their tracks.Cryptographic techniques can be utilized to defend data in transit among methods