SPOOFING

 

Spoofing

Spoofing means to provide false information about your idea gain unauthorized identity to gain unauthorized access to others computer systems. In a spoofing attack one person or program successfully pretends as another falsifying data thereby gaining as illegal advantage. IP spoofing are the most popular spoofing attacks. The objective of IP spoofing is to make the data look as if it has come from trusted host as it. Spoofing is always done with an intention.

Types of Spoofing

  1. IP Spoofing:  It do not provide mechanisms for authenticating the source or destination of a message ad they are thus vulnerable to spoofing attacks to verify the identify the sending or receiving post. 

  2. Content spoofing: It includes the caller’s number and sometimes 
  3. Caller ID spoofing:  It includes the caller’s name and caller’s number., it allows to hack the caller’s id information.
  4. E-mail spoofing: The sender information shown in emails. It is commonly used by spammers to hide the origin information  


Conclusion of Spoofing

Spoofing is the act of distinguishing a communication from an unknown source to apply to emails, phone calls. Websites or can be more technical and an IP address.

Spoofing attack is a situation in which person or an an attacker easily attack on the system by falsifying data to gain an illegitimate advantage.


PRIYANSHI VASHISTHA (2019-2023)

Computer Science Department
KIET Group of Institutions

Comments

Popular posts from this blog

QUANTUM STORAGE & MEMORY

QUANTUM COMPUTING: CAN FIGHT CLIMATE CHANGE

BLOCKCHAIN: HOW IT WORKS AND WHY SO POPULAR