The IT Law Wiki
No edit summary
Tag: sourceedit
 
(23 intermediate revisions by the same user not shown)
Line 1: Line 1:
  +
== Definitions ==
{{stub}}
 
   
  +
=== Biometrics ===
   
  +
'''Spoofing''' is
'''Spoofing''' involves creating a fraudulent [[website]] to mimic an actual, well-known [[website]] run by another party. [[E-mail]] spoofing occurs when the sender address and other parts of an [[e-mail header]] are altered to appear as though the [[e-mail]] originated from a different source. Spoofing hides the origin of an [[e-mail message]].
 
   
  +
{{Quote|[t]he ability to fool a [[biometric sensor]] into recognizing an illegitimate user as a legitimate user ([[verification]]) or into missing an [[identification]] of someone that is in the [[database]].<ref>[[NSTC Subcommittee on Biometrics]], Biometrics Glossary, at 26 (Sept. 14, 2006) ([http://www.biometrics.gov/Documents/Glossary.pdf full-text]).</ref>}}
[[Category:Computer Crime]]
 
  +
  +
=== Internet ===
  +
  +
'''Spoofing''' is "[c]reating a [[fraudulent]] [[Web site]] to mimic an actual, well-known [[site]] run by another party."<ref>[[Defense Department Cyber Efforts: DOD Faces Challenges In Its Cyber Activities]], at 15.</ref>
  +
  +
'''Spoofing''' is
  +
  +
{{Quote|[[unauthorized use|[u]nauthorized use]] of legitimate [[identification]] and [[authentication]] [[data]], such as [[user ID]]s and [[password]]s, by an [[intruder]] to [[impersonate]] an [[authorized user]] or [[process]] to gain [[access]] to an [[IS]] or [[data]] on it.<ref>[[Practices for Securing Critical Information Assets]], Glossary, at 58.</ref>}}
  +
  +
Other types of Internet spoofing include:
  +
  +
* [[DNS spoofing]]
  +
* [[E-mail spoofing]]
  +
* [[IP spoofing]]
  +
* [[VoIP spoofing]]
  +
  +
=== Military ===
  +
  +
'''Spoofing''' is
  +
  +
{{Quote|[a] type of [[deception]] by using an [[electronic device]] to [[transmit]] a "[[target]]" [[echo]]. The spoofing [[transmitter]] must operate at the same [[frequency]] and PRF as the [[radar]] to be deceived. The radar main pulse triggers the spoofing [[transmitter]] which, after a delay, [[transmit]]s a false [[echo]].<ref>Electronic Warfare and Radar Systems Engineering Handbook 10-1.25 (Apr. 1, 1997) ([http://www.microwaves101.com/encyclopedia/navy%20handbook/ew_radar_handbook.pdf full-text]).</ref>}}
  +
  +
== References ==
  +
<references />
  +
  +
== See also ==
  +
  +
<div style="{{column-count|2}}">
  +
  +
* [[Content spoofing]]
  +
* [[GPS spoofing]]
  +
* [[Liveness detection]]
  +
* [[Login-spoofing program]]
  +
* [[Mimic]]
  +
* [[Service spoofing]]
  +
  +
</div>
 
[[Category:Internet]]
 
[[Category:Internet]]
[[Category:Privacy]]
+
[[Category:Cybercrime]]
[[Category:E-mail]]
+
[[Category:Definition]]

Latest revision as of 01:03, 12 September 2015

Definitions[]

Biometrics[]

Spoofing is

[t]he ability to fool a biometric sensor into recognizing an illegitimate user as a legitimate user (verification) or into missing an identification of someone that is in the database.[1]

Internet[]

Spoofing is "[c]reating a fraudulent Web site to mimic an actual, well-known site run by another party."[2]

Spoofing is

[u]nauthorized use of legitimate identification and authentication data, such as user IDs and passwords, by an intruder to impersonate an authorized user or process to gain access to an IS or data on it.[3]

Other types of Internet spoofing include:

Military[]

Spoofing is

[a] type of deception by using an electronic device to transmit a "target" echo. The spoofing transmitter must operate at the same frequency and PRF as the radar to be deceived. The radar main pulse triggers the spoofing transmitter which, after a delay, transmits a false echo.[4]

References[]

  1. NSTC Subcommittee on Biometrics, Biometrics Glossary, at 26 (Sept. 14, 2006) (full-text).
  2. Defense Department Cyber Efforts: DOD Faces Challenges In Its Cyber Activities, at 15.
  3. Practices for Securing Critical Information Assets, Glossary, at 58.
  4. Electronic Warfare and Radar Systems Engineering Handbook 10-1.25 (Apr. 1, 1997) (full-text).

See also[]