Spoofing involves masquerading as another entity on a network to gain unauthorized access. Common spoofing attacks include masquerading as another system, hijacking an existing user session, and man-in-the-middle attacks where a third party intercepts communications. Intrusion detection systems monitor network activity for unusual behavior or policy violations and can help detect spoofing and other attacks. Firewalls filter network traffic to protect systems and enforce security policies, blocking unauthorized access while allowing legitimate communications.