Cloud  How certain assumptions can lead to an attack

How certain assumptions can lead to an attack