Discusses what to do in the event that an IT system has been spoofed. There are 4 sources in the bibliography of this 8-page paper.