Faking the sending address of a transmission to gain illegal entry into a secure system.
Sources:
CNSSI 4009-2015
NIST IR 8323r1
from
CNSSI 4009-2015
The deliberate inducement of a user or resource to take incorrect action. Note: Impersonating, masquerading, piggybacking, and mimicking are forms of spoofing.
Sources:
CNSSI 4009-2015
NIST IR 8323r1
from
CNSSI 4009-2015
Two classes of spoofing include (1) measurement spoofing: introduces signal or signal delay that cause the target receiver to produce incorrect measurements of time of arrival or frequency of arrival or their rates of change; and (2) data spoofing: introduces incorrect digital data to the target receiver for its use in processing of signals and the calculation of PNT.
Sources:
NIST IR 8323r1
from
DHS GPS CI - adapted
Within the context of this document, spoofing includes manipulation of legitimate GNSS signals with intent to corrupt PNT data or signal measurement integrity. For example, it includes, but is not limited to: the transmission of delayed or false GNSS signals with intent to manipulate an asset’s computed position or time and frequency.
Sources:
NIST IR 8323r1