Term
|
Definition
An account installed by default on a device or within an operating system with a default set of user credentials that are usually insecure. |
|
|
Term
|
Definition
The act of exploiting a bug or design flaw in a software or firmware application to gain access to resources that normally would’ve been protected from an application or user. |
|
|
Term
|
Definition
Used in computer programs to bypass normal authentication and other security mechanisms in place. |
|
|
Term
|
Definition
When a signal transmitted on one copper wire creates an undesired effect on another wire; the signal “bleeds” over, so to speak. |
|
|
Term
|
Definition
The electromagnetic field generated by a network cable or network device, which can be manipulated to eavesdrop on conversations or to steal data. |
|
|
Term
|
Definition
A device used to add computers to a 10BASE5 network. It pierces the copper conductor of a coaxial cable and can also be used for malicious purposes. |
|
|
Term
|
Definition
Tapping into a network cable in an attempt to eavesdrop on a conversation or steal data. |
|
|
Term
|
Definition
The refraction of light as in a rainbow. If light is refracted in such a manner on fiber optic cables, the signal cannot be read by the receiver. |
|
|
Term
|
Definition
Electromagnetic Interference
A disturbance that can affect electrical circuits, devices, and cables due to electromagnetic conduction or radiation. |
|
|
Term
|
Definition
Radio Frequency Interference
Interference that can come from AM/FM transmissions and cell towers. |
|
|
Term
|
Definition
Refers to the investigations of conducted emissions from electrical and mechanical devices, which could be compromising to an organization. |
|
|
Term
|
Definition
An enclosure formed by conducting material or by a mesh of such material; it blocks out external static electric fields and can stop emanations from cell phones and other devices within the cage from leaking out. |
|
|
Term
|
Definition
A device that looks similar to a phone but has alligator clips that can connect to the various terminals used by phone equipment, enabling a person to listen in to a conversation. |
|
|
Term
|
Definition
Service Set Identifier
The name of a wireless access point (or network) to which network clients will connect; it is broadcast through the air. |
|
|
Term
|
Definition
Wired Equivalent Privacy
A deprecated wireless network security standard, less secure than WPA. |
|
|
Term
|
Definition
Wi-Fi Protected Access
A security protocol created by the Wi-Fi Alliance to secure wireless computer networks, more secure than WEP. |
|
|
Term
|
Definition
Advanced Encryption Standard
An encryption standard used with WPA and WPA2. The successor to DES/3DES and is another symmetric key encryption standard composed of three different block ciphers: AES-128, AES-192, and AES-256. |
|
|
Term
|
Definition
Temporal Key Integrity Protocol
An algorithm used to secure wireless computer networks; meant as a replacement for WEP. |
|
|
Term
|
Definition
A method used to filter out which computers can access the wireless network; the WAP does this by consulting a list of MAC addresses that have been previously entered. |
|
|
Term
|
Definition
Each client connected to the AP will not be able to communicate with each other, but they can each still access the Internet. |
|
|
Term
|
Definition
The act of searching for wireless networks by a person in a vehicle through the use of a device with a wireless antenna, often a particularly strong antenna. |
|
|
Term
|
Definition
A type of related-key attack, which is when an attacker observes the operation of a cipher using several different keys, and finding a mathematical relationship between them, allowing the attacker to ultimately decipher data. |
|
|
Term
|
Definition
The sending of unsolicited messages to Bluetooth-enabled devices such as mobile phones and PDAs. |
|
|
Term
|
Definition
The unauthorized access of information from a wireless device through a Bluetooth connection. |
|
|