Ora
Category: Cybersecurity Properties
Which of the following security properties does spoofing violate?