
Admin
Helpdice Team
Name the laws that are used for securing the data in a cloud.
Following are the laws that are used for securing that data in a cloud:
- Processing: This is used for the processing and completion of an application.
- File: This is used for managing and controlling the manipulation of the data.
- Output reconciliation: This is used for reconciliation of input and output data.
- Input validation: This is used for controlling the data.
- Security and backup: This is used for controlling security breaches logs and for providing backup.
Related QNA's
- Explain Raspberry Pi ?1 day ago