A deliberate attempt to cause a user or resource to perform an incorrect action, generally by exploiting poor authentication measures in order to masquerade as someone else. See alsosemantic attack, threat.
Internet
Assuming the identity of an existing user in order to discover information associated with that user or information that the user is allowed to access: a technique often used by criminals. When the spoofing involves an Internet Protocol Address, the process is known as IP spoofing.