Spoofing
nouncandidate·updated May 12, 2026
1. Faking the sending address of a transmission to gain illegal entry into a secure system. Impersonating, masquerading, piggybacking, and mimicking are forms of spoofing. 2. The deliberate inducement of a user or resource to take incorrect action.
Framework senses
National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Lexicon1 senseview framework →
- §1 · extended_definition_available
- Faking the sending address of a transmission to gain illegal [unauthorized] entry into a secure system.
- §1
- Faking the sending address of a transmission in order to gain illegal entry into a secure system
Federal Financial Institutions Examination Council (FFIEC) IT Examination Handbook Infobase, Glossary1 senseview framework →
- §1
- A form of masquerading where a trusted IP address is used instead of the true IP address as a means of gaining access to a computer system.
- §1
- “IP spoofing” refers to sending a network packet that appears to come from a source other than its actual source.
- §2 · sense_2_pending_review
- Involves— 1) the ability to receive a message by masquerading as the legitimate receiving destination, or 2) masquerading as the sending machine and sending a message to a destination.
- §3 · sense_3_pending_review
- 1. Faking the sending address of a transmission to gain illegal entry into a secure system. Impersonating, masquerading, piggybacking, and mimicking are forms of spoofing. 2. The deliberate inducement of a user or resource to take incorrect action.
- §1
- 1. Faking the sending address of a transmission to gain illegal entry into a secure system. Impersonating, masquerading, piggybacking, and mimicking are forms of spoofing. 2. The deliberate inducement of a user or resource to take incorrect action.
- §1
- “IP spoofing” refers to sending a network packet that appears to come from a source other than its actual source.
- §1
- Involves— 1) the ability to receive a message by masquerading as the legitimate receiving destination, or 2) masquerading as the sending machine and sending a message to a destination.