Spoofing
• Email address spoofing
• The sending address of an email isn’t really the
sender
• Man-in-the-middle attacks
• The person in the middle of the conversation
pretends to be both endpoints
MAC spoofing
• Changing the MAC address can be legitimate
• Internet provider expects a certain MAC address
• Certain applications require a particular MAC
address
IP address spoofing
• Easier to identify than MAC address spoofing
• Apply rules to prevent invalid traffic, enable switch
security