Difference between revisions of "Spoofing"

From Clinfowiki
Jump to: navigation, search
Line 8: Line 8:
  
 
Spoofing is a technique wherein malicious internet users pretend to be a person or a resource that they are not.  Malicious users typically commit spoofing for several reasons including:
 
Spoofing is a technique wherein malicious internet users pretend to be a person or a resource that they are not.  Malicious users typically commit spoofing for several reasons including:
 +
 
1.  to gain access to a resource or website they could not otherwise access
 
1.  to gain access to a resource or website they could not otherwise access
 +
 
2.  to manipulate unsuspecting users to give them account login credentials
 
2.  to manipulate unsuspecting users to give them account login credentials
 +
 
3.  to embarrass or cause other damage to a company or person by committing negative  
 
3.  to embarrass or cause other damage to a company or person by committing negative  
 
    acts while masquerading as them  (for example sending virus-ridden emails while  
 
    acts while masquerading as them  (for example sending virus-ridden emails while  
 
    masquerading as a Symantec employee)
 
    masquerading as a Symantec employee)

Revision as of 01:55, 5 April 2010

Spoofing:

  • Faking the sending address of a transmission in order to gain illegal entry into a secure system.
  • Making a website seem authentic to collect passwords and login names.

Added 4/4/2010 by Stephanie Dike

Spoofing is a technique wherein malicious internet users pretend to be a person or a resource that they are not. Malicious users typically commit spoofing for several reasons including:

1. to gain access to a resource or website they could not otherwise access

2. to manipulate unsuspecting users to give them account login credentials

3. to embarrass or cause other damage to a company or person by committing negative acts while masquerading as them (for example sending virus-ridden emails while masquerading as a Symantec employee)