That's the A method wherein the availability of data might be certain, so long as the company has long been vetted and located to get the many measures in place that will hold data safe and available. These abnormal activities could reveal a breach as part of your system http://finnyxwuq.bloggosite.com/1128648/cloud-computing-and-security-an-overview