a cyberattack, but not every cloud has such capability. Clouds can comprise multiple entities, and in such a configuration, no cloud can be more secure than its weakest link. If a cybercriminal can identify the provider whose vulnerabilities are the easiest to exploit , then this entity becomes a highly visibile target. The lack of security associated with this single entity