A type of attack in which one system entity illegitimately poses as (assumes the identity of) another entity.
« Back to Glossary IndexA type of attack in which one system entity illegitimately poses as (assumes the identity of) another entity.
« Back to Glossary IndexCyberlandia © 2024 All Rights Reserved