Watch this video on YouTube
In what type of attack does the attacker forge the sender's IP address to gain access to protected systems and confidential data?