Spoofing
An attacker pretends to be a different user of system to gain access to a service.
  1. IP spoofing - attacker uses someone elses IP address to acquire information or gain access.
  2. Email spoofing - spoofing the email address
  3. Web spoofing
  4. Non-technical spoofing


Please mail any comments about this page to wsummers@cs.nmhu.edu