Preview

spoofing

Better Essays
Open Document
Open Document
2478 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
spoofing
1.0 Introduction
The word "spoof" means to hoax, trick, or deceive. Therefore, in the IT world, spoofing refers tricking or deceiving computer systems or other computer users. This is typically done by hiding one's identity or faking the identity of another user on the Internet.
Spoofing can take place on the Internet in several different ways. One common method is through e-mail. E-mail spoofing involves sending messages from a bogus e-mail address or faking the e-mail address of another user. Fortunately, most e-mail servers have security features that prevent unauthorized users from sending messages. However, spammers often send spam messages from their own SMTP, which allows them to use fake e-mail addresses. Therefore, it is possible to receive e-mail from an address that is not the actual address of the person sending the message.
Another way spoofing takes place on the Internet is via IP spoofing. This involves masking the IP address of a certain computer system. By hiding or faking a computer's IP address, it is difficult for other systems to determine where the computer is transmitting data from. Because IP spoofing makes it difficult to track the source of a transmission, it is often used in denial-of-service attacks that overload a server. This may cause the server to either crash or become unresponsive to legitimate requests. Fortunately, software security systems have been developed that can identify denial-of-service attacks and block their transmissions.
Finally, spoofing can be done by simply faking an identity, such as an online username. For example, when posting on an Web discussion board, a user may pretend he is the representative for a certain company, when he actually has no association with the organization. In online chat rooms, users may fake their age, gender, and location.
While the Internet is a great place to communicate with others, it can also be an easy place to fake an identity. Therefore, always make sure you know who you

You May Also Find These Documents Helpful

  • Satisfactory Essays

    There are multiple versions of spoofing but this is when the hacker inputs a false header on the packet so it will trick the receiving network that the packet is from a legitimate source. This could send in harmful packets that could damage the network and allow hackers to gain access to the network.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    You Decide- Sec572 Week 2

    • 577 Words
    • 3 Pages

    The concept of IP spoofing decreased due to the demise of the services they exploited, spoofing can still be used and needs to be addressed by all security administrators.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Answer: Computer Hacking it is the act of bypassing ones account or database and hacking involves stealing of identity and use it in his/her own interest.…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    SEC 435 Wk 11 Final Exam

    • 513 Words
    • 3 Pages

    ____ occurs when an attacker intercepts packets with encrypted data and changes the destination address to forward the packets to a different destination on the Internet.…

    • 513 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Itp 1101 Research Paper

    • 2125 Words
    • 9 Pages

    This paper provides a general overview of denial-of-service attacks in which the primary goal of the attack is to remove or limit the victim’s access to a particular service or resource. The paper also provides an overview of on methods of attack and its impacts. It also includes information that may assist you on how to respond to such an attack.…

    • 2125 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Ais Ch. 11

    • 910 Words
    • 4 Pages

    3. Attacks involving manipulating and tricking individuals into divulging confidential information, such as imposter emails…

    • 910 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    No one is going to know who you are, which means no one will ever know if you fake the person you are. The user has the ability to control the way they are seen because everything is through a computer. Majority of the time this is what usually happen. People fake who they are in the way that they upload pictures that aren’t them or fake their interest. For example, when people use online dating apps they use fake pictures to attract someone.…

    • 987 Words
    • 4 Pages
    Good Essays
  • Better Essays

    References: Rasch, M. (2006, 19 September) Liar, Liar, and Pretexting. Retrieved July 27, 2008 from the World Wide Web: http://www.securityfocus.com/columnists/417/4…

    • 1990 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Identity Theft Q&A

    • 402 Words
    • 2 Pages

    When an identity thief calls or emails you pretending to be someone else in order to get your personal information.…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Comm 202 Exam Guide

    • 2750 Words
    • 11 Pages

    How much are people disguising themselves on social networks, and to what extend are these disguise acceptable?…

    • 2750 Words
    • 11 Pages
    Satisfactory Essays
  • Best Essays

    It checks for connection speed and static on the line to ascertain the best route for the packet to take to reach its destination. Acting as a gateway between networks, routers make sure that data is delivered to its proper destination. The second purpose of a router is to ensure that data does not go where it is not permitted. By acting as a virtual network traffic cop, routers keep data and specifically large files from being distributed to all machines on a network, which could potentially cripple the network (Hill,…

    • 4393 Words
    • 18 Pages
    Best Essays
  • Good Essays

    There are many types of propaganda, and they all work differently. The “fakery” technique attempts to deceive the consumer into thinking that the product is good without ever describing the real merits of the product. An example of this could be a soda…

    • 958 Words
    • 4 Pages
    Good Essays
  • Better Essays

    When it comes to online communication deception is a key issue. Deception online consists of identity deception, mimicking of data and processes, insincere responses, false excuses and promises, and fraud, (Rowe). Identity deception involves lies of who the person really is or even what they are like and often occurs in online chat rooms, videogames, forums, and discussion groups. Mimicking of data and processes consists of fake websites, bills and emails as well as hijacking of websites and personal profiles. Insincere responses, known by today’s youth as “trolling,” involves exaggerating responses, posturing, replacing actual emotions with false ones in responses, or purposely responding in a manner that is meant to engage…

    • 1608 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Identity

    • 573 Words
    • 3 Pages

    Evelyn Grooten uses numerous authors to define what identity is. She discusses the different aspects of what each author has to say based on their theories of identity. Many definitions of identity have been written in highly abstract philosophical, psychological, and sociological discourses (19). The reader must first grasp the idea of what identity may be. Moving forward each author begins to talk about what identity is on the internet. The article is based upon the different views on how each author views identity on the internet through the instant messaging system.…

    • 573 Words
    • 3 Pages
    Good Essays
  • Better Essays

    (Edwards6) One aspect of this is known as bootlegging. this is where someone copies a…

    • 986 Words
    • 4 Pages
    Better Essays