answersLogoWhite

0


Best Answer

Spoofing is when an attacker pretends to be someone else in order gain access to restricted resources or steal information. This type of attack can take a variety of different forms; for instance, an attacker can impersonate the internet Protocol (IP) address of a legitimate user in order to get into their accounts. Also, an attacker may send fraudulent emails and set up fake websites in order to capture users' login names, passwords, and account information. Faking an email or website is sometimes called a phishing attack. Another type of spoofing involves setting up a fake wireless access point and tricking victims into connecting to them through the illegitimate connection.

User Avatar

Wiki User

11y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What are the characteristics on spoofing as a computer threat?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

In order to gain illegitimate access to a network attackers often by-pass access control lists by?

switching off your computer


What best describes the security threat of spoofing?

dalban,, daning laka jawabane


What type of what is attacking?

in computer terms, it's a 'spoofing attack' in which fakes other viruses.


What is Spoofing in Spanish?

iv'e checked. it is just spoofing. i don't think there is a word for your 'spoofing'!! XD


Is ip spoofing is same as the web spoofing?

yea its same


Is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.?

spoofing


Can you go to jail for spoofing?

Yes, spoofing can be illegal and is considered a form of fraud in many jurisdictions. Engaging in spoofing activities such as caller ID spoofing or email spoofing with the intent to deceive or defraud can result in criminal charges and potential jail time. It is important to always use spoofing technology responsibly and legally.


When was Spook Spoofing created?

Spook Spoofing was created on 1928-01-14.


What is relation between computer threat and computer vulnerability?

Your computer is vulnerable by the protection of your firewall. If your firewall is open, or have no firewall, you are pretty much a siting duck. A computer threat is a virus that infects your computer to do unwanted and/or involuntary actions you did not request/intend/mistakenly do. The computer threat seeks for openness of a computer vulnerability.


What is computer and explain its characteristics?

list and explain some important characteristics of a computer?


What is ip spoofing?

IP spoofing is the process by which an IP address is created in order to conceal the senders identity or impersonate another person's IP address. IP spoofing is a crime and punishable by law.


Is lightning a threat to a computer?

Yes; if the power goes out, then your computer goes out.