This report delves into the critical aspects of IT risk management, focusing on the challenges and vulnerabilities associated with cloud computing and cyber attacks. It begins by defining cloud computing and its inherent risks, such as loss of visibility, unauthorized access, data deletion, and compromised administrative data. Various risk management techniques are then explored, including implementing robust protections, adhering to data exchange standards, utilizing single sign-on accounts, and employing end-to-end encryption. The report further addresses the rising issue of cyber attacks, detailing their consequences like data theft, fraud, malware, and denial-of-service attacks. It identifies different types of cyber attacks, including spyware, ransomware, malware, DDoS, brute force attacks, and phishing. Finally, the report outlines risk management techniques to combat these attacks, such as vulnerability scanning, intrusion detection systems, firewalls, employee training, regular antivirus updates, password changes, and data backups. This document is available on Desklib, a platform offering study tools and resources for students.