Term
|
Definition
An advanced security encryption protocol used in the Wi-Fi Protected Access 2 (WPA2) standard. |
|
|
Term
association request frame |
|
Definition
A frame that carries information about the data rates that the device can support along with the Service Set identifier (SSID) of the network it wants to join. |
|
|
Term
|
Definition
A server whose only job is to verify the authentication of devices. |
|
|
Term
|
Definition
|
|
Term
|
Definition
Two packets derived from the same initialization vector (IV). |
|
|
Term
cyclic redundancy check (CRC) |
|
Definition
A checksum based on the contents of the text. |
|
|
Term
|
Definition
Associating with a new access point. |
|
|
Term
|
Definition
A 1999 standard with a maximum rated speed of 54 Mbps using the 5 GHz spectrum. |
|
|
Term
|
Definition
A 1999 amendment to the 802.11 Standard that added 2 higher speeds (5.5 Mbps and 11 Mbps). |
|
|
Term
|
Definition
A standard formally ratified in 2003 for wireless LAN transmissions of devices transmitting at 54 Mbps. |
|
|
Term
|
Definition
The 2004 wireless security standard that addresses the two main weaknesses of wireless networks, encryption and authentication. |
|
|
Term
|
Definition
A proposed standard for faster wireless LANs projected to be ratified in 2009. |
|
|
Term
|
Definition
A standard originally developed for wired networks that provides a greater degret of security for wireless networks by implementing port-based authentication. |
|
|
Term
integrity check value (ICV) |
|
Definition
A checksum based on the contents of the text used in WEP encryption. |
|
|
Term
|
Definition
Storing information from a device on the network so if a user roams away from wireless access point and later returns he does not need to re-enter all of the credentials. |
|
|
Term
|
Definition
A series of 1s and Os equal in length to the text to be encrypted with Wired Equivalent Privacy (WEP) plus the integrity check value (1CV). |
|
|
Term
|
Definition
An attack that attempts to determine thc keystream by analyzing two packets that were created from the same initialization vector (IV). |
|
|
Term
Message Integrity Check (MIC) |
|
Definition
A protocol designed to prevent an attacker from capturing, altering, and resending data packets. |
|
|
Term
open system authentication |
|
Definition
The default method of authentication used by the IEEE 802.11 standard. |
|
|
Term
|
Definition
Scanning for a wireless device that listens for a beacon frame for a set period of time. |
|
|
Term
|
Definition
|
|
Term
|
Definition
A technology that allows a device to become authenticated to an access point before moving into its range. |
|
|
Term
|
Definition
An authentication protocol that uses a passphrase to generate encryption key and must be created and entered into both the access point and all wireless devices prior to the devices communicating. |
|
|
Term
|
Definition
A cipher algorithm used in Wired Equivalent Privacy (WEP) that takes one character and replaces it with one character. |
|
|
Term
|
Definition
Movement between cells of a wireless local area network. |
|
|
Term
Service Set Identifier (SSID) |
|
Definition
The network name for the wireless network that can be any alphanumeric string from 2 to 32 characters. |
|
|
Term
shared key authentication |
|
Definition
An optional Wired Encryption Privacy (WEP) authentication that uses challenge text for authentication. |
|
|
Term
Temporal Key Integrity Protocol (TKIP) |
|
Definition
A encryption technology that replaces the Wired Equivalent Privacy (WEP) protocol. |
|
|
Term
|
Definition
An access point with limited functionality (it does not provide authentication or encryption). |
|
|
Term
Wi-Fi (Wireless Fidelity) Alliance |
|
Definition
A consortium of wireless equipment manufacturers and software providers to promote wireless network technology. |
|
|
Term
Wi-Fl Protected Access (WPA) |
|
Definition
The first version of the security standards set by the Wi-Fi Alliance. |
|
|
Term
WI-Fl Protected Access 2 (WPA2) |
|
Definition
The second generation of Wi-Fi Protected Access (WPA) security. |
|
|
Term
Wired Equivalent Privacy (WEP) |
|
Definition
The encryption mechanism of thc IEEE 802.11 standard, considered to provide only low security. |
|
|
Term
|
Definition
A device that can monitor the airwaves for traffic. |
|
|
Term
|
Definition
A switch that contains authentication and encryption for wireless networks. |
|
|