Faking the sending address of a transmission to gain illegal [unauthorized] entry into a secure system.
Faking the sending address of a transmission to gain illegal [unauthorized] entry into a secure system.
The deliberate inducement of a user or resource to take incorrect action. Note: Impersonating, masquerading, piggybacking, and mimicking are forms of spoofing.