preview

Identity Spoofing

Decent Essays
Essentially, the basis of identity spoofing revolves around several other deceitful or manipulative acts, such as pharming, phishing, engagement in deceptive interactions, faking sources of data, principal spoofing, signature spoofing, and software entities as a whole. Based on details provided by the CAPEC community, pharming is the act of collecting critical details or information, provided by some user, where the details or information are entered or provided within a seemingly trusted location (“CAPEC-151: Identity Spoofing,” 2017). As an example, tricking a target to enter sensitive data over a web-based form could be considered a pharming attack. Additionally, phishing is the act of masquerading as an authentic entity, in which the target or…show more content…
Additionally, principal spoofing is a type of identity spoofing technique, where an attacker may assume the identity of another person, such as a friend or co-worker. Also a form of identity spoofing, signature spoofing is concerned with altering the digital signature or digital validity of a given message, such as a document or email, in order to mislead a target to performing potentially harmful acts. Identity spoofing also relates to some software entities, as identity spoofing can focus on the exploitation of software applications, in accordance with the CAPEC community (“CAPEC-151: Identity Spoofing,” 2017). Notably, identity spoofing is not identical to content spoofing, which is concerned with altering the content of a communication or message, and not necessarily the identity of a given party. Overall, the basis, or roots of identity spoofing are closely associated with, or derive from, pharming, phishing, engagement in deceptive interactions, faking sources of data, principal spoofing, signature spoofing, and certain software
Get Access