An attacker can interrupt services, disabling them or taking control over them. [1]
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.