The security laws which are implements to secure data in the cloud are as follows:
► Input Validation: Controls the input data which is being to any system.
► Processing: Control that the data is being processed correctly and completely in an application.
► File: Control the data being manipulated in any type of file.
► Output Reconciliation: Control the data that has to be reconciled from input to output.
► Backup & Recovery: Control the security breaches logs and the problems which has occurred while creating the back.
Saturday, March 5, 2011
Security Laws for the Data in Cloud
About Kanav Gupta
Soratemplates is a blogger resources site is a provider of high quality blogger template with premium looking layout and robust design
Cloud Computing
Labels:
Cloud Computing
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment