Real-World Cloud Cybersecurity Scenarios