Spoofing

Attacks where the attacker disguises as a trustworthy entity to steal money, data, or network access.