|
|
See Wide Area Network.
Warm sites provide some capabilities in the event of a recovery. The organization that wants to use a warm site will need to install, configure, and reestablish operations on systems that may already exist in the warm site.
A cipher hole that can be exploited.
Attacks that look for cipher holes.
A type of proxy that is used to act on behalf of a web client or web server.
A server that holds and delivers web pages and other web content using the HTTP protocol. See also Hypertext Transfer Protocol.
See Wired Equivalent Privacy.
A network that crosses local, regional, and international boundaries.
See Wireless Fidelity.
A NetBIOS name resolution service employed in Windows networks.
A type of Windows program (a file with either an .EXE or a .DLL extension) that is loaded automatically by the server or manually by the administrator.
A Microsoft API used to interact with the TCP/IP protocol.
A Windows-based attack that affects only computers running Windows NT 3.51 or 4. It is caused by the way that the Windows NT TCP/IP stack handles bad data in the TCP header. Instead of returning an error code or rejecting the bad data, it sends NT to the Blue Screen of Death (BSOD). Figuratively speaking, the attack "nukes" the computer.
A security protocol for 802.11b (wireless) networks that attempts to establish the same security for them as would be present in a wired network.
A wireless bridge used in a multipoint RF network.
It performs all the functions of a regular bridge, but it uses RF instead of cables to transmit signals.
802.11b wireless networks operating at 2.4Ghz.
A Local Area Network that employs wireless access points (WAPs) and clients using the 802.11b standard.
The primary method of connecting a wireless device to a network.
Technologies employing wireless communications.
The security layer of the Wireless Applications Protocol. WTLS provides authentication, encryption, and data integrity for wireless devices.
See Wireless Local Area Network.
An estimate of the amount of time and effort that would be needed to break a system.
A specific group of users or network devices, organized by job function or proximity to shared resources.
The copy of the data currently used by the network.
A computer that is not a server but is on a network. Generally, a workstation is used to do work, while a server is used to store data or perform a network function. In the simplest terms, a workstation is a computer that is not a server.
An association concerned with interoperability, growth, and standardization of the World Wide Web (WWW). This group is the primary sponsor of XML and other web-enabled technologies.
Similar to a virus. Worms, however, propagate themselves over a network. See also virus.
The standard implemented by the International Telecommunications Union (ITU), an international standards group, for directory services in the late 1980s. The standard was the basis for later models of directory structure, such as LDAP.
An area in a building where access is individually monitored and controlled.
|
|