The practice of making a transmission appear to come from an authorized user. For example, in IP spoofing, a transmission is given the IP address of an authorized user in order to obtain access to a computer or network.
[T]he viability of the digital signature certificate system depends on the effective functioning of certification authorities, independent parties who are able to bind the identity of the public key to its owner, to prevent the spoofing of public keys by impostors.