Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

Spoofing attack

Index Spoofing attack

In the context of network security, a spoofing attack is a situation in which a person or program successfully masquerades as another by falsifying data, to gain an illegitimate advantage. [1]

46 relations: Antenna (radio), ARP spoofing, Backscatter (email), Black Sea, Bounce message, Caller ID, Computer network, Confidence trick, Copyright, Deep packet inspection, DNS spoofing, Email, Email spam, File sharing, Firewall (computing), Global Positioning System, HTTP referer, Hypertext Transfer Protocol, IDN homograph attack, Internet protocol suite, IP address spoofing, Iran, Iran–U.S. RQ-170 incident, LAND, MAC spoofing, Man-in-the-middle attack, Moscow Kremlin, National Cybersecurity and Communications Integration Center, Network security, NRK, Paysite, Phishing, Prentice Hall, Protocol spoofing, Putin's Palace, Radio jamming, Referer spoofing, Simple Mail Transfer Protocol, Snail mail, Spoofing (anti-piracy measure), Stream cipher attacks, Telnet, Vladimir Putin, Voice over IP, Website spoofing, YouTube.

Antenna (radio)

In radio, an antenna is the interface between radio waves propagating through space and electric currents moving in metal conductors, used with a transmitter or receiver.

New!!: Spoofing attack and Antenna (radio) · See more »

ARP spoofing

In computer networking, ARP spoofing, ARP cache poisoning, or ARP poison routing, is a technique by which an attacker sends (spoofed) Address Resolution Protocol (ARP) messages onto a local area network.

New!!: Spoofing attack and ARP spoofing · See more »

Backscatter (email)

Backscatter (also known as outscatter, misdirected bounces, blowback or collateral spam) is incorrectly automated bounce messages sent by mail servers, typically as a side effect of incoming spam.

New!!: Spoofing attack and Backscatter (email) · See more »

Black Sea

The Black Sea is a body of water and marginal sea of the Atlantic Ocean between Eastern Europe, the Caucasus, and Western Asia.

New!!: Spoofing attack and Black Sea · See more »

Bounce message

A bounce message or just "bounce" is an automated message from a mail system, informing the sender of a previous message that that message had not been delivered (or some other delivery problem occurred).

New!!: Spoofing attack and Bounce message · See more »

Caller ID

Caller ID (caller identification, CID), also called calling line identification (CLID), Calling Line Identification (CLI), calling number delivery (CND), calling number identification (CNID), calling line identification presentation (CLIP), or call display, is a telephone service, available in analog and digital telephone systems, including VoIP, that transmits a caller's telephone number to the called party's telephone equipment when the call is being set up.

New!!: Spoofing attack and Caller ID · See more »

Computer network

A computer network, or data network, is a digital telecommunications network which allows nodes to share resources.

New!!: Spoofing attack and Computer network · See more »

Confidence trick

A confidence trick (synonyms include con, confidence game, confidence scheme, ripoff, scam and stratagem) is an attempt to defraud a person or group after first gaining their confidence, used in the classical sense of trust.

New!!: Spoofing attack and Confidence trick · See more »

Copyright

Copyright is a legal right, existing globally in many countries, that basically grants the creator of an original work exclusive rights to determine and decide whether, and under what conditions, this original work may be used by others.

New!!: Spoofing attack and Copyright · See more »

Deep packet inspection

Deep packet inspection is a type of data processing that inspects in detail the data being sent over a computer network, and usually takes action by blocking, re-routing, or logging it accordingly.

New!!: Spoofing attack and Deep packet inspection · See more »

DNS spoofing

DNS spoofing, also referred to as DNS cache poisoning, is a form of computer security hacking in which corrupt Domain Name System data is introduced into the DNS resolver's cache, causing the name server to return an incorrect result record, e.g. an IP address.

New!!: Spoofing attack and DNS spoofing · See more »

Email

Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people using electronic devices.

New!!: Spoofing attack and Email · See more »

Email spam

Email spam, also known as junk email, is a type of electronic spam where unsolicited messages are sent by email.

New!!: Spoofing attack and Email spam · See more »

File sharing

File sharing is the practice of distributing or providing access to digital media, such as computer programs, multimedia (audio, images and video), documents or electronic books.

New!!: Spoofing attack and File sharing · See more »

Firewall (computing)

In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

New!!: Spoofing attack and Firewall (computing) · See more »

Global Positioning System

The Global Positioning System (GPS), originally Navstar GPS, is a satellite-based radionavigation system owned by the United States government and operated by the United States Air Force.

New!!: Spoofing attack and Global Positioning System · See more »

HTTP referer

The HTTP (originally a misspelling of referrer) is an HTTP header field that identifies the address of the webpage (i.e. the URI or IRI) that linked to the resource being requested.

New!!: Spoofing attack and HTTP referer · See more »

Hypertext Transfer Protocol

The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, and hypermedia information systems.

New!!: Spoofing attack and Hypertext Transfer Protocol · See more »

IDN homograph attack

The internationalized domain name (IDN) homograph attack is a way a malicious party may deceive computer users about what remote system they are communicating with, by exploiting the fact that many different characters look alike (i.e., they are homographs, hence the term for the attack, although technically homoglyph is the more accurate term for different characters that look alike).

New!!: Spoofing attack and IDN homograph attack · See more »

Internet protocol suite

The Internet protocol suite is the conceptual model and set of communications protocols used on the Internet and similar computer networks.

New!!: Spoofing attack and Internet protocol suite · See more »

IP address spoofing

In computer networking, IP address spoofing or IP spoofing is the creation of Internet Protocol (IP) packets with a false source IP address, for the purpose of hiding the identity of the sender or impersonating another computing system.

New!!: Spoofing attack and IP address spoofing · See more »

Iran

Iran (ایران), also known as Persia, officially the Islamic Republic of Iran (جمهوری اسلامی ایران), is a sovereign state in Western Asia. With over 81 million inhabitants, Iran is the world's 18th-most-populous country. Comprising a land area of, it is the second-largest country in the Middle East and the 17th-largest in the world. Iran is bordered to the northwest by Armenia and the Republic of Azerbaijan, to the north by the Caspian Sea, to the northeast by Turkmenistan, to the east by Afghanistan and Pakistan, to the south by the Persian Gulf and the Gulf of Oman, and to the west by Turkey and Iraq. The country's central location in Eurasia and Western Asia, and its proximity to the Strait of Hormuz, give it geostrategic importance. Tehran is the country's capital and largest city, as well as its leading economic and cultural center. Iran is home to one of the world's oldest civilizations, beginning with the formation of the Elamite kingdoms in the fourth millennium BCE. It was first unified by the Iranian Medes in the seventh century BCE, reaching its greatest territorial size in the sixth century BCE, when Cyrus the Great founded the Achaemenid Empire, which stretched from Eastern Europe to the Indus Valley, becoming one of the largest empires in history. The Iranian realm fell to Alexander the Great in the fourth century BCE and was divided into several Hellenistic states. An Iranian rebellion culminated in the establishment of the Parthian Empire, which was succeeded in the third century CE by the Sasanian Empire, a leading world power for the next four centuries. Arab Muslims conquered the empire in the seventh century CE, displacing the indigenous faiths of Zoroastrianism and Manichaeism with Islam. Iran made major contributions to the Islamic Golden Age that followed, producing many influential figures in art and science. After two centuries, a period of various native Muslim dynasties began, which were later conquered by the Turks and the Mongols. The rise of the Safavids in the 15th century led to the reestablishment of a unified Iranian state and national identity, with the country's conversion to Shia Islam marking a turning point in Iranian and Muslim history. Under Nader Shah, Iran was one of the most powerful states in the 18th century, though by the 19th century, a series of conflicts with the Russian Empire led to significant territorial losses. Popular unrest led to the establishment of a constitutional monarchy and the country's first legislature. A 1953 coup instigated by the United Kingdom and the United States resulted in greater autocracy and growing anti-Western resentment. Subsequent unrest against foreign influence and political repression led to the 1979 Revolution and the establishment of an Islamic republic, a political system that includes elements of a parliamentary democracy vetted and supervised by a theocracy governed by an autocratic "Supreme Leader". During the 1980s, the country was engaged in a war with Iraq, which lasted for almost nine years and resulted in a high number of casualties and economic losses for both sides. According to international reports, Iran's human rights record is exceptionally poor. The regime in Iran is undemocratic, and has frequently persecuted and arrested critics of the government and its Supreme Leader. Women's rights in Iran are described as seriously inadequate, and children's rights have been severely violated, with more child offenders being executed in Iran than in any other country in the world. Since the 2000s, Iran's controversial nuclear program has raised concerns, which is part of the basis of the international sanctions against the country. The Joint Comprehensive Plan of Action, an agreement reached between Iran and the P5+1, was created on 14 July 2015, aimed to loosen the nuclear sanctions in exchange for Iran's restriction in producing enriched uranium. Iran is a founding member of the UN, ECO, NAM, OIC, and OPEC. It is a major regional and middle power, and its large reserves of fossil fuels – which include the world's largest natural gas supply and the fourth-largest proven oil reserves – exert considerable influence in international energy security and the world economy. The country's rich cultural legacy is reflected in part by its 22 UNESCO World Heritage Sites, the third-largest number in Asia and eleventh-largest in the world. Iran is a multicultural country comprising numerous ethnic and linguistic groups, the largest being Persians (61%), Azeris (16%), Kurds (10%), and Lurs (6%).

New!!: Spoofing attack and Iran · See more »

Iran–U.S. RQ-170 incident

On 4 December 2011, an American Lockheed Martin RQ-170 Sentinel unmanned aerial vehicle (UAV) was captured by Iranian forces near the city of Kashmar in northeastern Iran.

New!!: Spoofing attack and Iran–U.S. RQ-170 incident · See more »

LAND

A LAND (Local Area Network Denial) attack is a DoS (Denial of Service) attack that consists of sending a special poison spoofed packet to a computer, causing it to lock up.

New!!: Spoofing attack and LAND · See more »

MAC spoofing

MAC spoofing is a technique for changing a factory-assigned Media Access Control (MAC) address of a network interface on a networked device.

New!!: Spoofing attack and MAC spoofing · See more »

Man-in-the-middle attack

In cryptography and computer security, a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.

New!!: Spoofing attack and Man-in-the-middle attack · See more »

Moscow Kremlin

The Moscow Kremlin (p), usually referred to as the Kremlin, is a fortified complex at the heart of Moscow, overlooking the Moskva River to the south, Saint Basil's Cathedral and Red Square to the east, and the Alexander Garden to the west.

New!!: Spoofing attack and Moscow Kremlin · See more »

National Cybersecurity and Communications Integration Center

The National Cybersecurity and Communications Integration Center (NCCIC) is part of the Office of Cybersecurity & Communications of the U.S. Department of Homeland Security.

New!!: Spoofing attack and National Cybersecurity and Communications Integration Center · See more »

Network security

Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

New!!: Spoofing attack and Network security · See more »

NRK

NRK (an abbreviation of the Norwegian: Norsk rikskringkasting AS, generally expressed in English as the Norwegian Broadcasting Corporation) is the Norwegian government-owned radio and television public broadcasting company, and the largest media organisation in Norway.

New!!: Spoofing attack and NRK · See more »

Paysite

A paysite or pay site, in pornography jargon, is a website that charges money to become a member and view its content, and often produces original adult content.

New!!: Spoofing attack and Paysite · See more »

Phishing

Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.

New!!: Spoofing attack and Phishing · See more »

Prentice Hall

Prentice Hall is a major educational publisher owned by Pearson plc.

New!!: Spoofing attack and Prentice Hall · See more »

Protocol spoofing

Protocol spoofing is used in data communications to improve performance in situations where an existing protocol is inadequate, for example due to long delays or high error rates.

New!!: Spoofing attack and Protocol spoofing · See more »

Putin's Palace

The Residence at Cape Idokopas (Резиденция на мысе Идокопас) also known as the "Palace on the Idokopas Cape", often called in the media "Putin's Palace", "Dacha Putin", "Putin’s country cottage", etc., is a large Italianate palace complex located on the Black Sea coast near the village of Praskoveevka in Gelendzhik, Krasnodar Krai, Russia.

New!!: Spoofing attack and Putin's Palace · See more »

Radio jamming

Radio jamming is the deliberate jamming, blocking or interference with authorized wireless communications.

New!!: Spoofing attack and Radio jamming · See more »

Referer spoofing

In HTTP networking, typically on the World Wide Web, referer spoofing (based on a canonised misspelling of "referrer") sends incorrect referer information in an HTTP request in order to prevent a website from obtaining accurate data on the identity of the web page previously visited by the user.

New!!: Spoofing attack and Referer spoofing · See more »

Simple Mail Transfer Protocol

Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (email) transmission.

New!!: Spoofing attack and Simple Mail Transfer Protocol · See more »

Snail mail

Snail mail and smail (from snail + mail) — named after the snail with its slow speed — is a retronym that refers to letters and missives carried by conventional postal delivery services.

New!!: Spoofing attack and Snail mail · See more »

Spoofing (anti-piracy measure)

Spoofing, or decoying, is the practice of inundating online networks with bogus or incomplete files of the same name in an effort to reduce copyright infringement on file sharing networks.

New!!: Spoofing attack and Spoofing (anti-piracy measure) · See more »

Stream cipher attacks

Stream ciphers, where plaintext bits are combined with a cipher bit stream by an exclusive-or operation (xor), can be very secure if used properly.

New!!: Spoofing attack and Stream cipher attacks · See more »

Telnet

Telnet is a protocol used on the Internet or local area network to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection.

New!!: Spoofing attack and Telnet · See more »

Vladimir Putin

Vladimir Vladimirovich Putin (a; born 7 October 1952) is a Russian statesman and former intelligence officer serving as President of Russia since 2012, previously holding the position from 2000 until 2008.

New!!: Spoofing attack and Vladimir Putin · See more »

Voice over IP

Voice over Internet Protocol (also voice over IP, VoIP or IP telephony) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet.

New!!: Spoofing attack and Voice over IP · See more »

Website spoofing

Website spoofing is the act of creating a website, as a hoax, with the intention of misleading readers that the website has been created by a different person or organization.

New!!: Spoofing attack and Website spoofing · See more »

YouTube

YouTube is an American video-sharing website headquartered in San Bruno, California.

New!!: Spoofing attack and YouTube · See more »

Redirects here:

Email forging, GPS spoofing, Gps spoofing, Spoof attack, Spoof attacks, Spoofing attacks.

References

[1] https://en.wikipedia.org/wiki/Spoofing_attack

OutgoingIncoming
Hey! We are on Facebook now! »