5. Chapter 11, Example 5: “Erasing an Audit Trail” The Problem: Web Applications
6.
7. Alternative Approaches “ There are two distinct advantages to [Kinamik’s] method of log file security ... mathematical certainty that the contents have not been altered, … and chaining the data stream provides an immutable sequence of events.” - Securosis Approaches: Capabilities: Digital Signature File Hashing Time Stamping Write Once Read Many Integrity Assurance ✔ ✔ ✔ ✔ Real-Time Application ✔ Granular Detail ✔ ✔ (some) Event Sequencing ✔ ✔ Cost-Effective Scaling ✔ ✔
8.
9.
10. Accessing Major Markets through Partners Regulatory Compliance Government Agencies Telecoms, ISPs & Utilities Litigation Support Non-repudiation Fraud Detection & Deterrence 2010-11 2011 Financial Svcs. & Healthcare 2011 2011