Spoofing Threats
← Back to STRIDE
Threats where an attacker pretends to be someone or something else. Examples include IP spoofing, email spoofing, and session hijacking. Mitigated by strong authentication, mutual TLS, and cryptographic verification of identity.