Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Computer security
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Spoofing=== {{Main|Spoofing attack}} Spoofing is an act of pretending to be a valid entity through the falsification of data (such as an IP address or username), in order to gain access to information or resources that one is otherwise unauthorized to obtain. Spoofing is closely related to [[phishing]].<ref>{{cite web |title=What is Spoofing? – Definition from Techopedia |url=https://www.techopedia.com/definition/5398/spoofing |url-status=live |archive-url=https://web.archive.org/web/20160630134737/https://www.techopedia.com/definition/5398/spoofing |archive-date=30 June 2016 |access-date=2022-01-16 |website=techopedia.com}}</ref><ref>{{cite encyclopedia|chapter-url=http://www.oxfordreference.com/view/10.1093/acref/9780199688975.001.0001/acref-9780199688975-e-4987|chapter=spoofing|access-date=8 October 2017|title=A Dictionary of Computer Science|doi=10.1093/acref/9780199688975.001.0001|isbn=978-0-19-968897-5|publisher=Oxford University Press|date=21 January 2016|editor1-last=Butterfield|editor1-first=Andrew|editor2-last=Ngondi|editor2-first=Gerard Ekembe}}</ref> There are several types of spoofing, including: * [[Email spoofing]], is where an attacker forges the sending (''From'', or source) address of an email. * [[IP address spoofing]], where an attacker alters the source IP address in a [[network packet]] to hide their identity or impersonate another computing system. * [[MAC spoofing]], where an attacker modifies the [[MAC address|Media Access Control (MAC) address]] of their [[network interface controller]] to obscure their identity, or to pose as another. * [[Biometrics|Biometric]] spoofing, where an attacker produces a fake biometric sample to pose as another user.<ref>{{cite book|editor1-last=Marcel|editor1-first=Sébastien|editor2-last=Nixon|editor2-first=Mark|editor3-last=Li|editor3-first=Stan|year=2014|title=Handbook of Biometric Anti-Spoofing: Trusted Biometrics under Spoofing Attacks|language=en|location=London|publisher=Springer|doi=10.1007/978-1-4471-6524-8|isbn=978-1-4471-6524-8|issn=2191-6594|lccn=2014942635|series=Advances in Computer Vision and Pattern Recognition|s2cid=27594864}}</ref> * [[Address Resolution Protocol]] (ARP) spoofing, where an attacker sends spoofed address resolution protocol onto a [[local area network]] to associate their [[MAC address|Media Access Control address]] with a different host's IP address. This causes data to be sent to the attacker rather than the intended host. In 2018, the cybersecurity firm [[Trellix]] published research on the life-threatening risk of spoofing in the healthcare industry.<ref>{{Cite web |title=80 to 0 in Under 5 Seconds: Falsifying a Medical Patient's Vitals |url=https://www.trellix.com/en-us/about/newsroom/stories/research/80-to-0-in-under-5-seconds-falsifying-a-medical-patients-vitals.html |access-date=2023-02-09 |website=www.trellix.com |language=en}}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)