Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Spoofing

Handbook of Research on Technoethics
Pretending to operate from a different Internet address than you really are at.
Published in Chapter:
The Ethics of Deception in Cyberspace
Neil C. Rowe (U.S. Naval Postgraduate School, USA)
Copyright: © 2009 |Pages: 13
DOI: 10.4018/978-1-60566-022-6.ch034
Abstract
We examine the main ethical issues concerning deception in cyberspace. We first discuss the concept of deception and survey ethical theories applicable to cyberspace. We then examine deception for commercial gain such as spam, phishing, spyware, deceptive commercial software, and dishonest games. We next examine deception used in attacks on computer systems, including identity deception, Trojan horses, denial of service, eavesdropping, record manipulation, and social engineering. We then consider several types of deception for defensive purposes, less well known, including honeypots, honeytokens, defensive obstructionism, false excuses, deceptive intelligence collection, and strategic deception. In each case we assess the ethical issues pro and con for the use of deception. We argue that sometimes deception in cyberspace is unethical and sometimes it is ethical.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Cyber Crime Threats, Strategies to Overcome, and Future Trends in the Banking Industry
Spoofing is an identity deception used to gain access to restricted resources. Example items to spoof are IP addresses, port numbers and usernames. Secure Shell programs are not even immune to spoofing.
Full Text Chapter Download: US $37.50 Add to Cart
The Essence of Cyber Security: The Main Historical Stages of the Development of Cyber Threats
A fraudulent scheme to create facsimiles of legitimate websites that easily obtain confidential information from victims.
Full Text Chapter Download: US $37.50 Add to Cart
Implementing Information Security Using Multimodal Biometrics
This attack forces the system or application to copy the actions of other.
Full Text Chapter Download: US $37.50 Add to Cart
Application of Computer Modelling in Adaptive Compensation of Interferences on Global Navigation Satellite Systems
Full Text Chapter Download: US $37.50 Add to Cart
Online Privacy Issues
The act to deceive; in the Internet world, it is the act of pretending to be someone or something else by fooling hardware, software, or human users.
Full Text Chapter Download: US $37.50 Add to Cart
Semantic Web Services
Spoofing is a technique often used by spammers to make them harder to trace. Trojan viruses embedded in e-mail messages also employ spoofing techniques to ensure the source of the message is more difficult to locate
Full Text Chapter Download: US $37.50 Add to Cart
Marketing Vulnerabilities in an Age of Online Commerce
Pretending to be the owner of a trademark or organization name; registering and using a domain name that is deceptively similar to a trademark or organization name. This could be through transposing words or inverting a phrase.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber Security Competency Model Based on Learning Theories and Learning Continuum Hierarchy
This occurs when hackers attempt to hide their true identities or misrepresent themselves by using fake e-mail addresses or masquerading as someone else.
Full Text Chapter Download: US $37.50 Add to Cart
Marketing Vulnerabilities in an Age of Online Commerce
Pretending to be the owner of a trademark or organization name; registering and using a domain name that is deceptively similar to a trademark or organization name. This could be through transposing words or inverting a phrase.
Full Text Chapter Download: US $37.50 Add to Cart
Using the Virtual World to Teach About Human Trafficking: Interactive and Experiential Environments
This is where someone online pretends to be someone else, typically to gain trust with spurious intent.
Full Text Chapter Download: US $37.50 Add to Cart
Auditing Defense against XSS Worms in Online Social Network-Based Web Applications
It is condition where in attacker masquerades himself as some other legitimate user to perform illegal activity.
Full Text Chapter Download: US $37.50 Add to Cart
BDS: Browser Dependent XSS Sanitizer
It is a malicious technique of flooding false IP addresses on the network and hence acquiring the unauthorized access to the system. For.e.g. caller id spoofing: normally telephone calls are uniquely identified by the names and contact number. But advanced technology can forge a caller id information and display a wrong name and phone number.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR