Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

spoofing

Definitions:

  Faking the sending address of a transmission to gain illegal entry into a secure system.
Sources:
CNSSI 4009-2015
NIST IR 8323r1 from CNSSI 4009-2015

  The deliberate inducement of a user or resource to take incorrect action. Note: Impersonating, masquerading, piggybacking, and mimicking are forms of spoofing.
Sources:
CNSSI 4009-2015
NIST IR 8323r1 from CNSSI 4009-2015

  Two classes of spoofing include (1) measurement spoofing: introduces signal or signal delay that cause the target receiver to produce incorrect measurements of time of arrival or frequency of arrival or their rates of change; and (2) data spoofing: introduces incorrect digital data to the target receiver for its use in processing of signals and the calculation of PNT.
Sources:
NIST IR 8323r1 from DHS GPS CI - adapted

  Within the context of this document, spoofing includes manipulation of legitimate GNSS signals with intent to corrupt PNT data or signal measurement integrity. For example, it includes, but is not limited to: the transmission of delayed or false GNSS signals with intent to manipulate an asset’s computed position or time and frequency.
Sources:
NIST IR 8323r1