What is spoofing and how can it be used to attack a computer or network?

What will be an ideal response?


In spoofing, the address of the source computer is changed to make a packet appear to come
from a different computer. Using spoofing, an attacker can initiate access to a computer or can appear as just another transmission to a computer from a legitimate source that is already connected. A source routing attack can be considered a form of spoofing. Also, a DoS attack that floods a host with packets from many bogus source addresses is a form of spoofing.

Computer Science & Information Technology

You might also like to view...

WPS simplifies the configuration process, enabling the user to set up WPA PSK without having to enter a long string of symbols, random numbers, or letters. This provides a feature to protect wireless networks, but it is still susceptible to what kind of attack?

What will be an ideal response?

Computer Science & Information Technology

In addition to its primary layers, most operating systems incorporate a set of __________ routines such as linkage editors, loaders, line editors, disk formatting routines, sort routines, debugging features, library management routines, and so on.

a. resident b. utility c. add-on d. optional

Computer Science & Information Technology

Offers visitors a choice from a given set of options.

a. Hidden fields b. Select boxes c. Radio buttons d. Password box e. Checkboxes f. Email, telephone, and URL input types

Computer Science & Information Technology

The ____ action button jumps to Slide 1.

A. Home B. End C. Document D. Information

Computer Science & Information Technology