It refers to a computer or a network that is impersonating as a legal network. Hence, corrupt other networks or computers by misleading the signals of the network. E-mail spoofing means the e-mail reader is misguided to irrelevant path other than that of the original destination, generally by spam e-mails with the help of SMTP and telnet protocols.
- Ensure and enforce strong authentication as well as encryption techniques for securing the communications, messages transmitted, data and session.
- Firewalls should be installed as and when required.
- Keep a sharp eye on the network traffic. Regulate the traffic monitoring.