Term
|
Definition
A wireless device that contains an antenna, a radio transmitter/receiver to send and receive wireless signals, and a port that allows it to connect to a wired network. |
|
|
Term
Address Resolution Protocol (ARP) |
|
Definition
The protocol used so that a device can determine the media access control address of another device based on its Internet Protocol address |
|
|
Term
|
Definition
An attack in which the media accesscontrol address in the ARP cache isa corrupted so that the corresponding Internet Protocol address points to a different device. |
|
|
Term
|
Definition
An account that is secretly setup without the administrator's knowledge or permission, that cannot be detected, and that allows for remote access to the device. |
|
|
Term
|
Definition
The process of the access point sending out at regular intervals information to announce its presence and to provide the necessary information for devices to join the wireless network. |
|
|
Term
Berkeley Internet Name Domain (BIND) |
|
Definition
An Internet naming system that performs name resolution. |
|
|
Term
|
Definition
The act of sending unsolicited messages between Bluetooth to Bluetooth-enabled devices. |
|
|
Term
|
Definition
The unauthorized access of information from a wireless device through a Bluetooth connection. |
|
|
Term
|
Definition
A wireless technology that uses shortrange radio frequency transmissions. |
|
|
Term
carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) |
|
Definition
The IEEE 802.11 standard protocol for WLANs that attempts to prevent multiple wireless devices from transmitting at the same time. |
|
|
Term
|
Definition
A user account that is created automatically instead of by the administrator. |
|
|
Term
|
Definition
An attack that attempts to consume network resources so that the network or its devices cannot respond to legitimate requests. |
|
|
Term
|
Definition
An antenna that detects signals from all directions equally (also called omnidirectional attenna). |
|
|
Term
|
Definition
A frame sent to a device to force it to temporarily disconnect from the wireless network. |
|
|
Term
distributed denial of service (DDoS) |
|
Definition
An attack that uses hundreds or thousands of zombie computers in a botnet to flood a device with requests. |
|
|
Term
|
Definition
An attack that substitutes a Fraudulent address in a Domain Name System server. |
|
|
Term
|
Definition
|
|
Term
|
Definition
A request to a Domain Name System server that asks for a zone transfer. |
|
|
Term
|
Definition
Fraud that takes advantage of a grace period to delete Internet Domain Names. |
|
|
Term
Domain Name System Security Extensions (DNSSEC) |
|
Definition
A new secure version of the Domain Name System server that uses advanced measures to determine the authenticity of of data. |
|
|
Term
|
Definition
A hierarchical name system for matching computer names and numbers. |
|
|
Term
global positioning system (GPS) |
|
Definition
A navigation system that uses satellite communications to identify the precise location of a GPS receiver. |
|
|
Term
|
Definition
A list stored on a local computer that contains the mappings of names to computer numbers. |
|
|
Term
|
Definition
A system in which host tables are stored on the local computer. |
|
|
Term
|
Definition
A technique that enables a computer to forward any network traffic it receives from another device. |
|
|
Term
|
Definition
An attack that intercepts legitimate comniunication and forges a fictitious response to the sender. |
|
|
Term
|
Definition
The device in a Bluetooth network that controls all wireless traffic. |
|
|
Term
|
Definition
A system that allows computers on a network to be assigned both numeric addresses and humanreadable names. |
|
|
Term
network tap (test access point) |
|
Definition
A separate device that can be installed between two network devices, such as a switch, router, or firewall, to monitor traffic. |
|
|
Term
|
Definition
Unauthenticated connections to a Microsoft Windows 2000 or Windows NT computer that do not require a username or a password. |
|
|
Term
|
Definition
An antenna that detects signals from all directions equally. Also known as dipole antenna. |
|
|
Term
|
Definition
A program that creates fake packets to flood the wireless network. |
|
|
Term
|
Definition
A secret combination of letters and numbers that serve to authenticate (validate) a user by what he knows. |
|
|
Term
|
Definition
A network of Bluetooth devices. |
|
|
Term
|
Definition
A technology that allows a network administrator to configure the switch to redirect the traffic that occurs on some or all ports to a designated monitoring port on the switch. |
|
|
Term
|
Definition
A monitoring device or a computer with monitoring software that captures each packet to decode and analyze its contents. Also called a sniffer. |
|
|
Term
|
Definition
An attack that makes a copy of an intecepted transmission before sending it to the recipient. |
|
|
Term
|
Definition
An unauthorized point that by-passes all of the network security and opens the network and users to direct attacks. |
|
|
Term
|
Definition
The process of a wireless device looking for beacon frames. |
|
|
Term
|
Definition
A group of piconets in which connections exist between different piconets. |
|
|
Term
Simple Network Management Protocol (SNMP) |
|
Definition
A popular protocol used to manage network equipment. |
|
|
Term
|
Definition
The device in a Bluetooth network that takes commands from the master device. |
|
|
Term
|
Definition
The amount of time that a wireless device must wait after the medium is clear. |
|
|
Term
|
Definition
A monitoring device or a computer with monitoring software that captures each packet to decode and analyze its contents. Also called a protocol analyzer. |
|
|
Term
|
Definition
Pretending to be someone or something else by presenting false information. |
|
|
Term
|
Definition
A human-readable computer name composed of letters, numbers, and special symbols. |
|
|
Term
|
Definition
An attack that creates fictitious Transimssion Control Protocol packets to take advantage of a weakness in the protocol. |
|
|
Term
|
Definition
The process of passive wireless discovery, or of finding a WLAN signal and recording information about it. |
|
|
Term
|
Definition
Passwords that compromise security. |
|
|
Term
wireless location mapping |
|
Definition
The process of passive wireless discovery, or of finding a WLAN signal and recording information about it. |
|
|
Term
|
Definition
The exchange of information between Domain Name System servers. |
|
|