Languages: English | Français
A type of threat action whereby an unauthorized entity gains access to a system or performs a malicious act by illegitimately posing as an authorized entity.
Source: CNSSI 4009-2015 | Category: