An attacker is attempting to impersonate a trusted entity by presenting a fabricated network packet that appears to be part of an ongoing communication. Which kind of attack does this scenario best describe?
|Threats, Vulnerabilities, and Mitigations
|Security Program Management and Oversight
|General Security Concepts