Correct Answer: The security laws which are implements to secure data in the cloud are as follows: - Input validation : controls the input data which is being to any system - Processing : control that the data is being processed correctly and completely in an application - File : control the data being manipulated in any type of file - Output reconciliation : control the data that has to be reconciled from input to output - Backup and recovery: control the security breaches logs and the problems which has occurred while creating the back