Vocab Flashcards
Zero day attack
An attack that is executed on a vulnerability in software before the vulnerability is known to the creator of the software.
X.509
A common PKI standard developed by the ITU-T that incorporates the single sign on authentication method.
Worm
Code that runs on a computer without the user’s knowledge; a worm self replicates, whereas a virus does not.
Wiretapping
Tapping into a network cable in an attempt to eavesdrop on a conversation or steal data.
Wired Equivalent Privacy (WEP)
A deprecated wireless network security standard, less secure than WPA.
Wi-Fi Protected Setup (WPS)
A simplified way of connecting to wireless networks using an eight-digit code. it is now deprecated due to its insecure nature and should be disabled if currently used.
Wi-Fi Protected Access (WPA)
A security protocol created by the Wi-Fi alliance to secure wireless computer networks; more secure than WEP.
White hat
A type of hacker that is contracted to break into a system.
White-box testing
A method of testing applications or systems where the tester is given access to the internal workings of the system.
Whaling
A phishing attack that targets senior executives.
Web security gateway
An intermediary that can scan for viruses and filter Internet content.
Web of trust
A decentralized model used for sharing certificates without the need for a centralized CA.
Watering hole attack
An attacker profiles which websites a user accesses and later infects those sites to redirect the user to other websites.
Warm site
A site that has computers, phones, and servers, but they may require configuration before users can start working on them.
War-driving
The act of searching for wireless networks by a person in a vehicle through the use of a device with a wireless antenna, often a particularly strong antenna.
War-dialing
The act of scanning telephone numbers by dialing them one at a time and adding them to a list, in an attempt to gain access to computer networks.
War-chalking
The act of physically drawing symbols in public places that denote open, closed, or protected wireless networks.
Vulnerability scanning
The act of scanning for weaknesses and susceptibilities in the network and on individual systems.
Vulnerability management
The process of finding and mitigating software vulnerabilities in computers and networks.
Vulnerability assessment
Base lining of the network to assess the current security state of computers and networks.
Vulnerability
Weakness in your computer network to assess the current security state of comprises, servers, network devices, and the entire network in general.
VPN Concentrator
A hardware appliance that allows hundreds of users to connect to the network from remote locations via a VPN.