Suppose you are doing some online banking using your bank's website. An attacker has set up an active wiretap between your computer and your bank's server.
After checking your balance and reading through your transactions, you attempt to log out.
However, the attacker uses the active wiretap to send a message requesting to the bank a transfer from your account to an account they control. In the process, this causes your logout message to time out.
Describe the ways in which this is an example of attacks on confidentiality, integrity, and/or availability.