Computer criminals use denial-of-service attacks on information systems to _____
A. Gain unauthorized access
B. Steal sensitive data
C. Overwhelm and disrupt services
D. Install malware for future attacks