Glossary
Term | Description |
---|---|
Wired communications |
Media that transmit information over a closed connected path.
|
Wired Equivalent Privacy (WEP) |
A form of encrypted authentication that employs RC4. WEP supports only one-way authentication from client to WAP. WEP is considered insufficient for security because of several deficiencies in its design and implementation.
|
Wired Extension Mode |
A wireless network configuration where the wireless access point acts as a connection point to link the wireless clients to the wired network.
|
Wireless Application Protocol (WAP) |
A functioning industry-driven protocol stack that allows users through their WAP-capable devices, such as mobile phones, to communicate over a carrier’s network with the Internet.
|
Wireless local area network (WLAN) |
A local area network using wireless communication protocol.
|
Wireless Networking (802.11) |
A form of networking that uses radio waves as the connection medium following the 802. 11 standard. Often called Wi-Fi.
|
Wireless technology |
Permits the active or passive transfer of information between separated points without physical connection. Active information transfer may entail a transmit and/or receive emanation of energy, whereas passive information transfer entails a receiveonly capability. Currently wireless technologies use IR, acoustic, RF, and optical but, as technology evolves, wireless could include other methods of transmission.
|
Work Function Or Work Factor |
A way of measuring the strength of a cryptography system by measuring the effort in terms of cost and/or time. Usually the time and effort required to perform a complete brute-force attack against an encryption system is what the work function rating represents. The security and protection offered by a cryptosystem is directly proportional to the value of the work function/factor.
|
Workflow |
Defines all of the steps or business rules, from beginning to end, required for a process to run correctly.
|
Worm attack |
A harmful exploitation of a worm that can act beyond normally expected behavior, perhaps exploiting security vulnerabilities or causing denials of service.
|