Errors caused by the attacker induce incorrect operations.
Examples include the creation of a faulty network connection to deny network
services, the intentional introduction of incorrect data resulting in
incorrect output (i.e., garbage in - garbage out), and the use of a
scratched and bent diskette in a disk drive to cause the drive to
Complexity: Many of these attacks appear to be trivial to accomplish.