Companies can now be sued for privacy violations just as easily as they can be sued for security compromises.
_________ is a form of Denial of Service attack which interrupts the TCP three way handshake and leaves half open connections.