Problem
Suppose there is a simple UDP-based dictionary server in CIS. The dictionary server receives client requests to resolve word meanings, add new words to the dictionary, or delete any existing word from the dictionary. However, no security mechanisms are used in this server. As you are an esteemed security expert, you have been challenged by your friends to disrupt/break this dictionary server. Discuss how you would launch an attack on this server.