This document discusses security in cloud computing. It outlines some common security threats like SQL injection, phishing, malware, and bots. It also discusses where cloud computing can be found and some approaches to maintaining security at the client, hosting, and domain levels. Some security techniques mentioned include file encryption, two-factor authentication using biometrics, and encrypting information in cloud computing. Overall, the document stresses that security in cloud computing requires more attention to coding style and server administration to ensure no open ports are left vulnerable.