When legitimate users are denied access to computer services (or resources), usually by overloading the service with requests.
When legitimate users are denied access to computer services (or resources), usually by overloading the service with requests.