Definitions[edit | edit source]
Biometrics[edit | edit source]
|“||[t]he ability to fool a biometric sensor into recognizing an illegitimate user as a legitimate user (verification) or into missing an identification of someone that is in the database.||”|
Internet[edit | edit source]
|“||[u]nauthorized use of legitimate identification and authentication data, such as user IDs and passwords, by an intruder to impersonate an authorized user or process to gain access to an IS or data on it.||”|
Other types of Internet spoofing include:
Military[edit | edit source]
|“||[a] type of deception by using an electronic device to transmit a "target" echo. The spoofing transmitter must operate at the same frequency and PRF as the radar to be deceived. The radar main pulse triggers the spoofing transmitter which, after a delay, transmits a false echo.||”|
References[edit | edit source]
- NSTC Subcommittee on Biometrics, Biometrics Glossary, at 26 (Sept. 14, 2006) (full-text).
- Defense Department Cyber Efforts: DOD Faces Challenges In Its Cyber Activities, at 15.
- Practices for Securing Critical Information Assets, Glossary, at 58.
- Electronic Warfare and Radar Systems Engineering Handbook 10-1.25 (Apr. 1, 1997) (full-text).
See also[edit | edit source]
Community content is available under CC-BY-SA unless otherwise noted.