Security Implications of Leveraging Cloud Computing