1.

Name The Security Laws That Are Implemented For Data Security In Cloud?

Answer»

The FIRST one is the Input Validation which controls the input data. The second LAW is FILE which controls and manages the data being employed in any of the files. OUTPUT RECONCILIATION is another law which is liable for controlling the reconciliation of data from input to output.

The first one is the Input Validation which controls the input data. The second law is File which controls and manages the data being employed in any of the files. Output reconciliation is another law which is liable for controlling the reconciliation of data from input to output.



Discussion

No Comment Found