Wireless networks and cloud computing are susceptible to a variety of attacks that can compromise data security. Pick two attacks that can target wireless networks and cloud computing (one for each), briefly explain them, and suggest some security implementation strategies that organizations can use to prevent them.