Pretensión de una entidad de ser otra diferente,
para así acceder sin autorización a los recursos a los que aquella tiene
acceso. (ISO-7498-2). [Ribagorda:1997]
Pretensión de una entidad de hacerse pasar por otra
y transmitir mensajes por una red no estando autorizada a ello. [CESID:1997]
Pretención de una entidad de pasar por una entidad
diferente. [ISO-7498-2:1989]
A type of threat action
whereby an unauthorized entity gains access to a system or performs a malicious
act by illegitimately posing as an authorized entity. [CNSSI_4009:2010]
(I) A type of threat action
whereby an unauthorized entity gains access to a system or performs a malicious
act by illegitimately posing as an authorized entity. (See: deception.)
Usage: This type of threat
action includes the following subtypes:
·
"Spoof":
Attempt by an unauthorized entity to gain access to a system by posing as an
authorized user.
·
"Malicious
logic": In context of masquerade, any hardware, firmware, or software
(e.g., Trojan horse) that appears to perform a useful or desirable function,
but actually gains unauthorized access to system resources or tricks a user
into executing other malicious logic. (See: corruption,
incapacitation, main entry for "malicious logic", misuse.)
[RFC4949:2007]
A type of attack in which
one system entity illegitimately poses as (assumes the identity of) another
entity.
http://www.sans.org/security-resources/glossary-of-terms/
The pretence by an entity to
be a different entity. [ISO-7498-2:1989]
Prétention qu'a une
entité d'en être une autre. [ISO-7498-2:1989]
L'usurpation par un
entité qui se révèle être une entité différente de celle annoncée.
http://www.cases.public.lu/functions/glossaire/