spoofing represents an attack against data?
Protocol spoofing is used in data communications to improve performance in situations where the current protocol is inappropriate, for example due to long delays or high error rates.
Note: In the context of computer security, spoofing refers to various forms of data fraud that have nothing to do with the techniques mentioned here. Watch Impersonation Attack.
hee spoofing represents an attack against data?
In the context of information security, and in particular network security, a spoofing attack is a situation in which a person or program successfully identifies another person by falsifying data, to gain an illegitimate advantage.
In most protocol spoofing implementations, a communications device such as a modem or router simulates (“spoofing”) the remote endpoint to connect to a locally connected host, while using a more appropriate protocol to connect to a compatible remote device that performs an equivalent simulation at the other end of the communications link.