Читаем CISSP Practice полностью

A security protocol for wireless local-area networks (WLANs) defined in the 802.11b standard. WEP was intended to provide the same level of security as that of a wired LAN. LANs are inherently more secure than WLANs because LANs have some or the entire network inside a building that can be protected from unauthorized access. WLANs, which are over radio waves, therefore are more vulnerable to tampering. WEP attempted to provide security by encrypting data over radio waves so that it is protected as it is transmitted from one endpoint to another. NOTE: WEP has been broken and does not provide an effective security service against a knowledgeable attacker. Software to break WEP is freely available on the Internet.

Wireless Access Point (WAP)

It is a device that acts as a conduit to connect wireless communication devices together to allow them to communicate and create a wireless network.

Wireless application protocol

A standard for providing cellular telephones, pagers, and other handheld devices with secure access to e-mail and text-based Web pages. It is a standard that defines the way in which Internet communications and other advanced services are provided on wireless mobile devices. It is a suite of network protocols designed to enable different types of wireless devices to access files on an Internet-connected Web server.

Wireless fidelity (Wi-Fi)

Wi-Fi is a term describing a wireless local-area network (WLAN) that observes the IEEE 802.11 family of wireless networking standards.

Wireless intrusion detection and prevention system (WIDPS)

An intrusion detection and prevention system (IDPS) that monitors wireless network traffic and analyzes its wireless networking protocols to identify and stop suspicious activity involving the protocols themselves.

Wireless local-area network (WLAN)

A type of local-area network that uses high-frequency radio waves rather than wires to communicate between nodes. WLAN uses the IEEE 802.11 standard. Specifically, wireless LANs operate with transmission modes such as infrared, spread spectrum schemes, a multichannel frequency division multiplexing (FDM) system, and CSMA/CA. WLAN is a telecommunications network that enables users to make short-range wireless connections to the Internet or another network such as wireless MAN or wireless WAN.

Wireless Markup Language (WML)

A scripting language used to create content in the wireless application protocol (WAP) environment. WML is based on XML minus unnecessary content to increase speed.

Wireless metropolitan-area network (WMAN)

Wireless MANs are broadband systems that use radio to replace the telephone connections. WMAN is a telecommunications network that enables users to make medium-range wireless connections to the Internet or another network such as wireless LAN or wireless WAN. WMAN uses the IEEE 802.16 standard (WiMAX) and quality of service (QoS) is important.

Wireless personal-area networks (WPANs)

They are small-scale wireless networks that require no infrastructure to operate (e.g., Bluetooth). They are typically used by a few devices in a single room to communicate without the need to physically connect devices with cables. WPAN uses the IEEE 802.15 standard.

Wireless Robust Security Network (RSN)

A robust security network (RSN) is defined as a wireless security network that allows the creation of RSN associations (RSNA) only. RSNAs are wireless connections that provide moderate to high levels of assurance against WLAN security threats through the use of a variety of cryptographic techniques. Wireless RSN uses the IEEE 802.11i standard.

Wireless Sensor Network (WSN)

Wireless sensor network (WSN) is a collection of interconnected wireless devices that are embedded into the physical environment to provide measurements of many points over large space. The WSN can be used to establish building security perimeters and to monitor environmental changes (e.g., temperature and power) in a building.

Wireless wide-area network (WWAN)

A telecommunications network that offers wireless coverage over a large geographical area, typically over a cellular phone network.

Wiretapping

Перейти на страницу:

Похожие книги

100 абсолютных законов успеха в бизнесе
100 абсолютных законов успеха в бизнесе

Почему одни люди преуспевают в бизнесе больше других? Почему одни предприятия процветают, в то время как другие терпят крах? Известный лектор и писатель по вопросам бизнеса нашел ответы на эти очень трудные вопросы. В своей книге он представляет набор принципов, или `универсальных законов`, которые лежат в основе успеха деловых людей всего мира. Практические рекомендации Трейси имеют вид 100 доступных для понимания и простых в применении законов, относящихся к важнейшим сферам труда и бизнеса. Он также приводит примеры из реальной жизни, которые наглядно иллюстрируют, как работает каждый из законов, а также предлагает читателю упражнения по применению этих законов в работе и жизни.

Брайан Трейси

Деловая литература / Маркетинг, PR, реклама / О бизнесе популярно / Финансы и бизнес