Question: What are the current security vulnerabilities in cloud computing architecture?

Outcome: To identify the current vulnerabilities and security loophole in cloud computing.

Question: What are the security techniques utilized to prevent breaches and unauthorized access into the cloud network?

Outcome: To identify the current cloud security methods implemented and assess its effectiveness.

Question: what security aspect of cloud computing needs improvement?

Outcome: To determine areas of improvement in cloud computing security.

Question: what are the benefits and potential pitfalls for companies to move all their services and systems into the cloud?

Outcome: To identify the pros and cons of cloud hosted service