Cybercrime’s effects are felt throughout the Internet, and cloud computing offers a tempting target for many reasons. As previously discussed, startups typically have limited resources; to alleviate the expense of developing a secure computing environment, they might turn to cloud computing to deflect cybersecurity concerns . To support their clouds’ integ-rity, large providers typically require that users place 100 percent of their data within the provider’s cloud. Providers such as Google and Amazon have the existing infrastructure to deflect and survive a cyberattack, but not every cloud has such capability. Clouds can comprise multiple entities, and in such a configuration, no cloud can be more secure than its weakest link. If a cybercriminal can identify the provider whose vulnerabilities are the easiest to exploit , then this entity becomes a highly visibile target. The lack of security associated with this single entity