A spoofing attack is a situation in which one individual or program effectively disguises or mask as another by falsifying information and thereby gaining up an ill-conceived advantage. It may use for stealing password or IP addresses.
We know that a computer program is a set of instructions to be executed. And if the instructions are in execution, then it is called as process. In brief, a program in execution is called as process.