Spoofing attack
In the context of information security, and especially network security, a spoofing attack is a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage.
Wikipage disambiguates
2011–2012 Iranian protests2020 United States federal government data breachAGM-154 Joint Standoff WeaponARP spoofingAdversary (cryptography)Anti-spam techniquesAssembly (CLI)AuthenticationAutomatic Dependent Surveillance–BroadcastAutomatic link establishmentAutomotive securityBiometricsCertificate revocation listCisco NAC ApplianceClaire McCaskillCommunication with submarinesComparison of privilege authorization featuresContactless fingerprintingCookie stuffingCracking of wireless networksCurveBall (security vulnerability)CyberattackCybersecurity information technology listDMA attackDMZ (computing)DNS hijackingDNS spoofingDPP v LennonEdward SnowdenElectronic counter-countermeasureEmail forgingEmail fraudEmail spamExploit (computer security)Fancy BearFile Transfer ProtocolFiller textGPS signalsGPS spoofingGeolocation spoofing
Link from a Wikipage to another Wikipage
primaryTopic
Spoofing attack
In the context of information security, and especially network security, a spoofing attack is a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage.
has abstract
In the context of information ...... ain an illegitimate advantage.
@en
Link from a Wikipage to an external page
Wikipage page ID
page length (characters) of wiki page
Wikipage revision ID
1,017,233,394
Link from a Wikipage to another Wikipage
date
August 2016
@en
reason
Source doesn't address international calls.
@en
wikiPageUsesTemplate
hypernym
comment
In the context of information ...... ain an illegitimate advantage.
@en
label
Spoofing attack
@en