Spoofing Threats

Back to STRIDE

Threats where an attacker pretends to be someone or something else. Examples include IP spoofing, email spoofing, and session hijacking. Mitigated by strong authentication, mutual TLS, and cryptographic verification of identity.

application-security threat-modeling stride spoofing