|“||[t]he ability to fool a biometric sensor into recognizing an illegitimate user as a legitimate user (verification) or into missing an identification of someone that is in the database.||”|
|“||[u]nauthorized use of legitimate identification and authentication data, such as user IDs and passwords, by an intruder to impersonate an authorized user or process to gain access to an IS or data on it.||”|
Other types of Internet spoofing include:
|“||[a] type of deception by using an electronic device to transmit a "target" echo. The spoofing transmitter must operate at the same frequency and PRF as the radar to be deceived. The radar main pulse triggers the spoofing transmitter which, after a delay, transmits a false echo.||”|
- NSTC Subcommittee on Biometrics, Biometrics Glossary, at 26 (Sept. 14, 2006) (full-text).
- Defense Department Cyber Efforts: DOD Faces Challenges In Its Cyber Activities, at 15.
- Practices for Securing Critical Information Assets, Glossary, at 58.
- Electronic Warfare and Radar Systems Engineering Handbook 10-1.25 (Apr. 1, 1997) (full-text).