Ora

Category: Cybersecurity Properties

Which of the following security properties does spoofing violate?