Spoofing
nounid
4213·updated May 12, 2026candidate
1. Faking the sending address of a transmission to gain illegal entry into a secure system. Impersonating, masquerading, piggybacking, and mimicking are forms of spoofing. 2. The deliberate inducement of a user or resource to take incorrect action.
polysemous
Classifications
Entity Type
Threat0%rule-basedmulti_axis_classifier_low_confidence.v1
Sensitivity
—85%llm-generatedllm:claude-haiku-4-5
Information Class
—90%llm-generatedllm:claude-haiku-4-5
Variants
- plural
- Spoofings
- possessive
- Spoofing's
- pluralpossessive
- Spoofings'
Framework definitions
National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Lexicon1 senseview framework →
- §1 · extended_definition_available
- Faking the sending address of a transmission to gain illegal [unauthorized] entry into a secure system.
- §1
- Faking the sending address of a transmission in order to gain illegal entry into a secure system
Federal Financial Institutions Examination Council (FFIEC) IT Examination Handbook Infobase, Glossary1 senseview framework →
- §1
- A form of masquerading where a trusted IP address is used instead of the true IP address as a means of gaining access to a computer system.
- §1
- “IP spoofing” refers to sending a network packet that appears to come from a source other than its actual source.
- §2 · sense_2_pending_review
- Involves— 1) the ability to receive a message by masquerading as the legitimate receiving destination, or 2) masquerading as the sending machine and sending a message to a destination.
- §3 · sense_3_pending_review
- 1. Faking the sending address of a transmission to gain illegal entry into a secure system. Impersonating, masquerading, piggybacking, and mimicking are forms of spoofing. 2. The deliberate inducement of a user or resource to take incorrect action.
- §1
- 1. Faking the sending address of a transmission to gain illegal entry into a secure system. Impersonating, masquerading, piggybacking, and mimicking are forms of spoofing. 2. The deliberate inducement of a user or resource to take incorrect action.
- §1
- “IP spoofing” refers to sending a network packet that appears to come from a source other than its actual source.
- §1
- Involves— 1) the ability to receive a message by masquerading as the legitimate receiving destination, or 2) masquerading as the sending machine and sending a message to a destination.
Outgoing relationships
No outgoing triples
This term is not the subject of any RDF-style relationship yet.
Incoming relationships
No incoming triples
No other term currently asserts a relationship to this one.