Thus moving to a cloud infrastructure, it might change the attackers’ access level
and motivation, as well as the effort and risk—a fact that must be considered as future work. But, for supporting a
cloud-specific risk assessment, it seems most profitable to start by examining the exact nature of cloud-specific
vulnerabilities.