1. Faking the sending address of a transmission to gain illegal entry into a secure system.
Source(s):
CNSSI 4009-2015
2. The deliberate inducement of a user or resource to take incorrect action.
Note: Impersonating, masquerading, piggybacking, and mimicking are forms of spoofing.
Source(s):
CNSSI 4009-2015