Understanding Blockchain and Cryptocurrencies. Concepts and Definitions. There are 3 main stages of computer network evolution: Centralised networks. These were the first computer networks. They are typified by one main computer (server) with a number of other computers connected to it. As a result, if the information on the main computer is erased or lost, it […]

Spoofing attack

In the context of information security, and especially network security, a spoofing attack is a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage. Many of the protocols in the TCP/IP suite do not provide mechanisms for authenticating the source or destination of a message, and are thus vulnerable to spoofing […]