Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] Walk-through, code WAN (wide area network) War driving Ware committee report Ware, Willis Warranty of cyberworthiness Watermarking Weak keys, DES Weak passwords Weakest link principle Weakest point Weakness [See Risk analysis; Risks; Threats; Vulnerabilities.] Weaknesses Web bugs 2nd Web servers, escape-character attack Web sites [See also Internet.] content, legal issues defacing posting privacy policies privacy advertising adware contests cookies credit card payments drive-by installation highjackers keystroke loggers offers online environment online profiling payment schemes payments online precautions registration shopping site ownership spyware third-party ads third-party cookies web bugs privacy controls, commercial privacy controls, government tracking usage vulnerabilities Well-formed transactions Well-known authentication WEP (wired equivalent privacy) White-box testing Wide area network (WAN) WiFi [See Wireless.] WiFi Protected Access (WPA) Wild cards Wilshire Associates, e-mail theft Windows, distributed authentication Windows, multilevel databases [See also Views.] Wireless networks description eavesdropping interception rogue access points security theft of service 2nd vulnerabilities vulnerabilities, case study war driving wiretapping Wiretapping 2nd Woods, Alan Word, deleting text Work for hire Workstations World War II case studies ASINTOER code Enigma code machine Japanese codes poem codes silken codes Soviet Union codes Worms [See also Malicious code; Viruses.] Code Red 2nd definition Internet worm WPA (WiFi Protected Access) Write-down |