During the 2000s, the application of cloud computing started to consider form Along with the institution of Amazon Website Services (AWS) in 2002, which authorized developers to make applications independently.Credential theft occurs when attackers steal login aspects, usually via phishing, allowing them to login as a certified user and access acco