Media that transmit information over a closed connected path.
|Wired Equivalent Privacy (WEP)||
A form of encrypted authentication that employs RC4. WEP supports only one-way authentication from client to WAP. WEP is considered insufficient for security because of several deficiencies in its design and implementation.
|Wired Extension Mode||
A wireless network configuration where the wireless access point acts as a connection point to link the wireless clients to the wired network.
|Wireless Application Protocol (WAP)||
A functioning industry-driven protocol stack that allows users through their WAP-capable devices, such as mobile phones, to communicate over a carrier’s network with the Internet.
|Wireless local area network (WLAN)||
A local area network using wireless communication protocol.
|Wireless Networking (802.11)||
A form of networking that uses radio waves as the connection medium following the 802. 11 standard. Often called Wi-Fi.
Permits the active or passive transfer of information between separated points without physical connection. Active information transfer may entail a transmit and/or receive emanation of energy, whereas passive information transfer entails a receiveonly capability. Currently wireless technologies use IR, acoustic, RF, and optical but, as technology evolves, wireless could include other methods of transmission.
|Work Function Or Work Factor||
A way of measuring the strength of a cryptography system by measuring the effort in terms of cost and/or time. Usually the time and effort required to perform a complete brute-force attack against an encryption system is what the work function rating represents. The security and protection offered by a cryptosystem is directly proportional to the value of the work function/factor.
Defines all of the steps or business rules, from beginning to end, required for a process to run correctly.
A harmful exploitation of a worm that can act beyond normally expected behavior, perhaps exploiting security vulnerabilities or causing denials of service.