Data Destruction
Resource Hijacking
Denial of Service