This document discusses cloud computing risks and security. It identifies several types of risks including unauthorized access to data, insecure interfaces, insider threats, technology sharing issues, data loss or leakage, hijacking, and unknown risk profiles. It also discusses how cloud service providers use methods like encryption, VPNs, logging, and data segregation to protect customer data and security. Finally, it outlines some advantages of cloud computing in establishing security through data centralization, incident response capabilities, and logging while also noting challenges around regulatory compliance, disaster recovery, and ensuring long-term data accessibility.