Understanding Cloud Computing Vulnerabilities