Audit trails track process exercise in order that any time a security breach occurs, the mechanism and extent on the breach is often identified. Storing audit trails remotely, exactly where they will only be appended to, can maintain burglars from covering their tracks.Cryptographic techniques can be used to defend data in transit amongst systems,