Cybercrime’s effects are felt throughout the Internet, and cloud computing offers a tempting target for many reasons. As previously discussed, startups typically have limited resources; to alleviate the expense of developing a secure computing environment, they might turn to cloud computing to deflect cybersecurity concerns . To support their clouds’ integ-rity, large providers typically require that users place 100 percent of their data within the provider’s cloud. Providers such as Google and Amazon have the existing infrastructure to deflect and survive a cyberattack, but not every cloud has such capability. Clouds can comprise multiple entities, and in such a configuration, no cloud can be more secure than its weakest link. If a cybercriminal can identify the provider whose vulnerabilities are the easiest to exploit , then this entity becomes a highly visibile target. The lack of security associated with this single entity threatens the entire cloud in which it resides. If not all cloud providers supply adequate security measures , then these clouds will become highpriority targets for cybercriminals. By their architecture’s inherent nature, clouds offer the opportunity for simultaneous attacks to numerous sites, and without proper security, hundreds of sites could be comprised through a single malicious activity