Discuss Shared technology vulnerabilities in the cloud / Uncategorized It must consist of: 1. 5 source annotated bibliography 2. Summary or Abstract containing at least 750 words.