Spoofing encompasses a very wide variety of attack types. When considering threats to the network, it is helpful to use the OSI model to determine what vulnerabilities and potential exploits exist at different layers. Spoofing attacks that corrupt forwarding at layer 2 (Data Link) can have substantial impact and be difficult to mitigate.
As you study this lesson, answer the following questions:
Acquire Centre