How security policies implementing in cloud computing

How security policies implementing in cloud computing?

ANS:   the policy is following us
  1. Authentication: The process of providing identity is called authentication. Most computer system uses a user ID and password combination for identity and authentication. You identity yourself using a user ID and authenticate your identity with a password.
  2. Single sing on : Single sing on (SSO) is a session/user authentication process that permits a user to enter one name and password in order to access multiple application.
  3. Integrity: It assures you that data has not changed without your knowledge (the information cannot be altered in storage or transit sender and receiver without the alteration being detected).
  4. Privacy : Internet privacy involves the desire or mandate  of personal privacy concerning transaction or transmission of data via the internet.
  5. Trust : Organization’s belief in the reliability, truth, ability, or strength of someone or something. Trust revolves around ‘assurance’ and confidence that people, data entities, information or processes will function or behave in expected ways.
  6. Policy:  A security policy should protect people and information, and set the rules for expected behavior by users, system administrators, management, and security personnel.
  7. Authorization: Authorization is the act of checking to see if a user has the  proper permission to access a particular file or perform a particular action. 

Related topics

Professor Jayesh video tutorial

Please use contact page in this website if you find anything incorrect or you want to share more information about the topic discussed above.