This scenario presents a severe case of Spoofing attack on an organization's IP Address. It is oblivious that human needs are endless, and indeed man has to come up with creative ideas to satisfy them. However, the means that the employee in this case uses to increase his or her basic salary is a dangerous endeavor. Through IP Address spoofing, an individual (the hacker) gets the rare opportunity to eavesdrop on a particular database system by sending IP packs from a bogus (or "spoofed") source link to masquerade itself. In order to achieve this form of spoofing, in a very fashionable manner, the employee must have explored one of these two options to overload the database system by means of packets that seem originate from the genuine source IP addresses. Fig. 1: IP Address Spoofing Process (Vacca, 2014) The auditor ought to notify the company's IT specialists to trace and block the spoofing immediately he/she detected that breach. This is because the errant employee must have been first, flooded his/her Human Resources systems with packets from numerous burlesqued addresses. Through this method, the employee managed to send directly to a spoofing attack victim more data that his/her system cannot handle. Alternatively, the hacker may have chosen to spoof a victim's IP address and launch packets from that link to several different addressees on the network. As soon as another machine gets a packet, it will robotically convey a response packet to the sender. Because the parodied packets emerge to be from the target's IP address, the victim will unknowingly relay all responses to the spoofed packets to the target's IP address hence flooding it. Away from the flooding objective, the IP spoofing attacks can also initiate a bypass of an IP address-based certification. This method can be very complicated and is applicable when confident relationships exist between devices on the network and domestic systems. Trust relationships depend on IP addresses (instead of user logins) to authenticate machines' distinctiveness of access requests to the systems. This permits malevolent parties to instigate spoofing attacks to masquerade as legitimate machines and circumvent trust-based system safety procedure The sources of spoofed packets are traceable through the IP trace-back technology. This can be achieved through scrutinizing logging of doubtful packets in routers as well as Hop-by-hop trace-back because the two technologies can lead one back to the source of the spoofed packets. As soon as a node senses that it is a prey of flood attack, it can notify the Internet Service Provider (ISP). In flood attacks, the Internet Service Provider can establish the router that is launching this stream to the target. Then it can settl