In the context of information security, and especially network security, a spoofing attack is a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage.
Potential use of GPS spoofing against a naval vessel
Authentication is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicating a person or thing's identity, authentication is the process of verifying that identity. It might involve validating personal identity documents, verifying the authenticity of a website with a digital certificate, determining the age of an artifact by carbon dating, or ensuring that a product or document is not counterfeit.
ATM user authenticating himself
A security hologram label on an electronics box for authentication
NSA KAL-55B Tactical Authentication System used by the U.S. military during the Vietnam War – National Cryptologic Museum
A military police officer checks a driver's identification card before allowing her to enter a military base.