Typically there are two types of known attacks on a cloud computing network; widespread and targeted.

For example, a Remote Access Tool (RAT) that infects users across 20 countries is considered a widespread attack – while the same attack against two government embassies and against no one else is an example of a targeted attack. The tool used in both instances is the same but the motivation of the attackers and their chosen targets set the attacks apart.

Please discuss ways to prevent security vulnerabilities that could leave a cloud computing network exposed and measures that can be used to increase security.