The topics discussed in this chapter are botnets, more discussion on DoS attacks, cost of a DoS attacks, ICMP echo datagrams, TCP 3-way handshake, TCP SYNC flood attack. After studying this chapter you will be able to distinguish between different types of security attacks, identify and classify which security attacks leads to which security breach category.