|Likelyhood of attack
|An adversary blocks the delivery of an important system resource causing the system to fail or stop working.
|This attack pattern requires knowledge of where important system resources are logically located as well as how they operate.
|An attacker obstructs the interactions between system components. By interrupting or disabling these interactions, an adversary can often force the system into a degraded state or even to fail.