This document discusses security issues related to cloud computing. It begins with definitions of cloud computing and describes its service and deployment models. It then outlines several security risks to data in the cloud, such as spoofing, tampering, and denial of service attacks. The document emphasizes the importance of protecting sensitive data through encryption, data sanitization, and isolation between users. It also examines security issues introduced by virtualization, the key enabling technology for cloud computing. Specifically, it notes vulnerabilities in hypervisor security and potential attacks on the hypervisor through the host operating system or guest operating systems. Overall, the document provides a high-level overview of cloud security risks and best practices for securing data and virtualized environments in the cloud.