Threats, Attacks, and Vulnerabilities: Your guide to building a security strategy for cloud apps