Spoofing attack involves using a fake network address to pretend to be a different computer.
Attackers may change a computer's network address to appear as an authorized computer
IP spoofing can enable an attacker to gain access to protected internal resources.
References:
Kim, D., & Solomon, M. (2014). Malicious Attacks, Threats, and Vulnerabilities. In Fundamentals of information systems security, second edition (2nd ed., p. 112). Burlington, MA: Jones & Bartlett Learning.