Math, asked by zakirhuss7870, 2 months ago


Spoofing hampers which one of the following Security foundations?
Select the correct hion(s) and click submit
Integrity
Non-repudiation
Authorization
Authentication​

Answers

Answered by Anonymous
30

Step-by-step explanation:

In the context of information security, and especially network security, a spoofing attack is a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage.

Similar questions