Term Description
Wired communications
Media that transmit information over a closed connected path.
Wired Equivalent Privacy (WEP)
A form of encrypted authentication that employs RC4. WEP supports only one-way authentication from client to WAP. WEP is considered insufficient for security because of several deficiencies in its design and implementation.
Wired Extension Mode
A wireless network configuration where the wireless access point acts as a connection point to link the wireless clients to the wired network.
Wireless Application Protocol (WAP)
A functioning industry-driven protocol stack that allows users through their WAP-capable devices, such as mobile phones, to communicate over a carrier’s network with the Internet.
Wireless local area network (WLAN)
A local area network using wireless communication protocol.
Wireless Networking (802.11)
A form of networking that uses radio waves as the connection medium following the 802. 11 standard. Often called Wi-Fi.
Wireless technology
Permits the active or passive transfer of information between separated points without physical connection. Active information transfer may entail a transmit and/or receive emanation of energy, whereas passive information transfer entails a receiveonly capability. Currently wireless technologies use IR, acoustic, RF, and optical but, as technology evolves, wireless could include other methods of transmission.
Work Function Or Work Factor
A way of measuring the strength of a cryptography system by measuring the effort in terms of cost and/or time. Usually the time and effort required to perform a complete brute-force attack against an encryption system is what the work function rating represents. The security and protection offered by a cryptosystem is directly proportional to the value of the work function/factor.
Defines all of the steps or business rules, from beginning to end, required for a process to run correctly.
Worm attack
A harmful exploitation of a worm that can act beyond normally expected behavior, perhaps exploiting security vulnerabilities or causing denials of service.