You can include any graphs or charts that is necessary to explain cloud computing or security.
Discuss the effects of malware and phishing attacks