« Back to Glossary IndexA type of attack in which one system entity illegitimately poses as (assumes the identity of) another entity.