IP spoofing involves inserting false source IP addresses to disguise an attacker's identity. It can enable attacks like session hijacking and denial of service. The document outlines how IP spoofing works, examples like the Mitnick attack, and defenses like filtering and encryption/authentication. TCP and IP are the core protocols that enable spoofing if source addresses are not properly validated.