Spoofing hampers which one of the following Security foundations?
Select the correct hion(s) and click submit
Integrity
Non-repudiation
Authorization
Authentication
Answers
Answered by
30
Step-by-step explanation:
In the context of information security, and especially network security, a spoofing attack is a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage.
Similar questions