W Flashcards
WAF
Web Application Firewall
A firewall that operates at the application layer (Layer 7) instead of the network layer (Layer 3), which most firewalls operate at.
It filters, monitors, and analyzes HTTP traffic between a web application and the internet.
WAP
Wireless Access Point
A networking device that allows wireless-capable devices to connect to a wired network.
WEP
Wired Equivalent Privacy
An encryption method intended to secure wireless networks. It uses a static key to secure the entire network (rather than each user having their own separate key), so it is not considered secure, and it deprecated.
WIDS
Wireless Intrusion Detection System
A device designed to detect and alert concerning any unauthorized activities on the wireless network in real-time
WIPS
Wireless Intrusion Prevention System
A device that offers real-time monitoring and security protection for wireless networks, preventing, detecting, and responding to potential security threats, thereby improving overall network security.
WO
Work Order
A document that includes a detailed breakdown that lists what services will be provided and when. It lists specific items that need to be completed.
It is used in conjunction with the MSA to avoid renegotiating basic terms of the contract, instead focusing on detailed, specific tasks.
In essence, it helps evaluate whether the job was done properly.
Ex. The scope of the job, the location, deliverables schedule, acceptance criteria, etc.
WPA
Wi-Fi Protected Areas
WPA is deprecated and has been replaced by later versions.
A security standard for computing devices equipped with wireless internet connections. It was created to replace WEP.
While WEP uses a static key, WPA uses TKIP, which dynamically changes the key that systems use.
WPS
Wi-Fi Protected Setup
A network security standard to create a secure wireless home network. It is deprecated, replaced by Wi-Fi Easy Connect.
It is designed to make the process of connecting to a secure wireless network from a computer or other device easier by automatically connecting to networking devices.
WTLS
Wireless TLS
The security services in the Wireless Application Protocol. WTLS is based on TLS, the landline version that is widely used on the Internet.
WTLS encrypts messages between the mobile Wireless Application Protocol client and the gateway (the base station), which decrypts the WTLS and re-encrypts it using SSL before sending it to its destination.