This document provides a general overview of attacks in which the primary goal of the attack is to deny the victim(s) access to a particular resource.