A type of attack in which one system entity illegitimately poses as (assumes the identity of) another entity.
« Back to Glossary Index
« Back to Glossary Index
A type of attack in which one system entity illegitimately poses as (assumes the identity of) another entity.
« Back to Glossary Index
Comments are closed.