This document provides an overview of cloud computing and cloud security. It defines cloud computing and discusses cloud deployment models, service models, and common security threats. The document outlines how to model attacks by identifying assets, threats, and attacker capabilities. It examines threats to confidentiality, integrity and availability. Real-world examples of data loss, downtime and phishing attacks on clouds are also presented. The document concludes that while cloud computing is widely used, security must be a top priority when working in the cloud.