What is it called when an attacker makes data to look like it’s coming from a legitimate source?

What is it called when an attacker makes data to look like it’s coming from a legitimate source?

What is it called when an attacker makes data to look like it’s coming from a legitimate source?

A.
hacking

B.
spoofing

C.
hijacking

D.
multithreading



Leave a Reply 0

Your email address will not be published. Required fields are marked *