What is technique whereby an intruder attempts to gain unauthorized access by altering a packet’s IP address to make it appear as though the packet originated in a part of the network with higher access privileges?
A.
Encryption
B.
IP Spoofing
C.
Authentication
D.
Tracker
E.
NAT