An attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else.
« Back to Glossary Index
« Back to Glossary Index
An attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else.
« Back to Glossary Index
Comments are closed.