The IT Law Wiki



Spoofing is

[t]he ability to fool a biometric sensor into recognizing an illegitimate user as a legitimate user (verification) or into missing an identification of someone that is in the database.[1]


Spoofing is "[c]reating a fraudulent Web site to mimic an actual, well-known site run by another party."[2]

Spoofing is

[u]nauthorized use of legitimate identification and authentication data, such as user IDs and passwords, by an intruder to impersonate an authorized user or process to gain access to an IS or data on it.[3]

Other types of Internet spoofing include:


Spoofing is

[a] type of deception by using an electronic device to transmit a "target" echo. The spoofing transmitter must operate at the same frequency and PRF as the radar to be deceived. The radar main pulse triggers the spoofing transmitter which, after a delay, transmits a false echo.[4]


  1. NSTC Subcommittee on Biometrics, Biometrics Glossary, at 26 (Sept. 14, 2006) (full-text).
  2. Defense Department Cyber Efforts: DOD Faces Challenges In Its Cyber Activities, at 15.
  3. Practices for Securing Critical Information Assets, Glossary, at 58.
  4. Electronic Warfare and Radar Systems Engineering Handbook 10-1.25 (Apr. 1, 1997) (full-text).

See also[]