Understanding Cloud Computing Vulnerabilities In Cyber Security