In IP Spoofing
secret data are illegally distributed through computer networks.
cyber criminals attack another computer by identifying the electronic identity of a trusted machine in order to mask his own true electronic identity.
data confidentially is achieved using cryptographic and steganographic algorithms
cyber terrorist, cyber fraud or cyber crimes are identified