an illegal action in cyberspace by which an attacker gains entry into the target system.
— cybrary.it
"The methodology involves layering heterogeneous security technologies in the common attack vectors to ensure that attacks missed by one technology are caught by another."
— ferc.gov
"[...] panaudotas tas pats atakos vektorius kenkėjo, kuris vykdė atakas ir platino netikras naujienas."
— lrt.lt
"Den hyppigste angrebsvektor brugt til at brugt inficere virksomheder med ondsindet spam [...]"
— elektronikfokus.dk
"Vi [...] identifiserer skadevare, angrepsvektor og verktøy."
an illegal action in cyberspace by which a person or program successfully masquerades as another by falsifying data thereby gaining an illegitimate advantage.
— CELEX:52008SC0511/EN
"According to the latest DDoS report [...], more than half of all denial-of-service attacks[...] involved [...] spoofing."
— krebsonsecurity.com
"Apsimestinėse
atakose programišius šniukštinėja ir klausosi srauto, kuris keliauja tinklu nuo siuntėjo iki gavėjo."
— esparama.lt
"Vi ved af erfaring, at svindlerne typisk bruger et tilfældigt nummer til spoofing [...]"
— tdc.dk
"Svindlere som praktiserer spoofing bruker både eksisterende og falske telefonnumre. "