Which two attack vectors are protected by Cloud Security? (Choose Two)