Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Download
Faster access than browser!
 

Wireless security

Index Wireless security

Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. [1]

119 relations: AAA (computer security), Ad hoc, Address Resolution Protocol, Aircrack-ng, Application layer, Ars Technica, Authentication, Back Orifice, Backdoor (computing), BackTrack, Barcode reader, Black hat, Bluetooth, Captive portal, CCMP (cryptography), Centrino, China, Cisco Systems, Common Criteria, Computer network, Data link layer, Denial-of-service attack, Diceware, Dictionary attack, Dongle, Dynamic Host Configuration Protocol, Electromagnetic shielding, Encryption, End-to-end encryption, Ettercap (software), Extensible Authentication Protocol, Federal Bureau of Investigation, FIPS 140-2, Firmware, FreeRADIUS, GNU Privacy Guard, Hot Standby Router Protocol, Hotspot (Wi-Fi), IEEE 802.11, IEEE 802.11i-2004, IEEE 802.1X, IEEE Standards Association, Institute of Electrical and Electronics Engineers, International Data Group, Internet Authentication Service, Internet Connection Sharing, Internet traffic, IP address, IPsec, Ipsectrace, ..., Kismet (software), KRACK, Layer 2 Tunneling Protocol, Lightweight Directory Access Protocol, Linux, List of router firmware projects, Local area network, MAC address, MAC filtering, MAC spoofing, MacOS, Man-in-the-middle attack, McGraw-Hill Education, Microsoft TechNet, Microsoft Windows, Mobile security, NetIQ eDirectory, Network layer, Network security, Open Shortest Path First, Packet analyzer, Passphrase, Payment card industry, Payment Card Industry Data Security Standard, Payment Card Industry Security Standards Council, PC Card, Personal digital assistant, Personal identification number, Piggybacking (Internet access), Point-to-Point Tunneling Protocol, Pre-shared key, Pretty Good Privacy, Privilege (computing), Public key certificate, RADIUS, Rogue access point, Router (computing), Routing Information Protocol, RSA Security, Script kiddie, Secure Shell, Service set (802.11 network), Smart card, Software, Spanning Tree Protocol, Stealth wallpaper, TechRepublic, Tempest (codename), Temporal Key Integrity Protocol, TJ Maxx, Transport Layer Security, Trojan horse (computing), USB, Virtual private network, White hat (computer security), Wi-Fi Alliance, Wi-Fi Protected Access, WikiHow, Wired Equivalent Privacy, Wireless, Wireless access point, Wireless community network, Wireless gateway, Wireless intrusion prevention system, Wireless LAN, Wireless network interface controller, Wireless Public Key Infrastructure, Wireless router, Xsupplicant. Expand index (69 more) »

AAA (computer security)

AAA refers to Authentication, Authorization and Accounting.

New!!: Wireless security and AAA (computer security) · See more »

Ad hoc

Ad hoc is a Latin phrase meaning literally "for this".

New!!: Wireless security and Ad hoc · See more »

Address Resolution Protocol

The Address Resolution Protocol (ARP) is a communication protocol used for discovering the link layer address, such as a MAC address, associated with a given network layer address, typically an IPv4 address.

New!!: Wireless security and Address Resolution Protocol · See more »

Aircrack-ng

Aircrack-ng is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs.

New!!: Wireless security and Aircrack-ng · See more »

Application layer

An application layer is an abstraction layer that specifies the shared communications protocols and interface methods used by hosts in a communications network.

New!!: Wireless security and Application layer · See more »

Ars Technica

Ars Technica (a Latin-derived term that the site translates as the "art of technology") is a website covering news and opinions in technology, science, politics, and society, created by Ken Fisher and Jon Stokes in 1998.

New!!: Wireless security and Ars Technica · See more »

Authentication

Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity.

New!!: Wireless security and Authentication · See more »

Back Orifice

Back Orifice (often shortened to BO) is a computer program designed for remote system administration.

New!!: Wireless security and Back Orifice · See more »

Backdoor (computing)

A backdoor is a method, often secret, of bypassing normal authentication or encryption in a computer system, a product, or an embedded device (e.g. a home router), or its embodiment, e.g. as part of a cryptosystem, an algorithm, a chipset, or a "homunculus computer" (such as that as found in Intel's AMT technology).

New!!: Wireless security and Backdoor (computing) · See more »

BackTrack

BackTrack was a Linux distribution that focused on security, based on the Knoppix Linux distribution aimed at digital forensics and penetration testing use.

New!!: Wireless security and BackTrack · See more »

Barcode reader

A bar code reader (or bar code scanner) is an electronic device that can read and output printed barcodes to a computer.

New!!: Wireless security and Barcode reader · See more »

Black hat

A black hat hacker (or black-hat hacker) is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain".

New!!: Wireless security and Black hat · See more »

Bluetooth

Bluetooth is a wireless technology standard for exchanging data over short distances (using short-wavelength UHF radio waves in the ISM band from 2.4 to 2.485GHz) from fixed and mobile devices, and building personal area networks (PANs).

New!!: Wireless security and Bluetooth · See more »

Captive portal

A captive portal is a web page which is displayed to newly connected users before they are granted broader access to network resources.

New!!: Wireless security and Captive portal · See more »

CCMP (cryptography)

Counter Mode Cipher Block Chaining Message Authentication Code Protocol, Counter Mode CBC-MAC Protocol or simply CCMP (CCM mode Protocol) is an encryption protocol designed for Wireless LAN products that implements the standards of the IEEE 802.11i amendment to the original IEEE 802.11 standard.

New!!: Wireless security and CCMP (cryptography) · See more »

Centrino

Centrino is a brand name of Intel Corporation which represents its Wi-Fi and WiMAX wireless computer networking adapters.

New!!: Wireless security and Centrino · See more »

China

China, officially the People's Republic of China (PRC), is a unitary one-party sovereign state in East Asia and the world's most populous country, with a population of around /1e9 round 3 billion.

New!!: Wireless security and China · See more »

Cisco Systems

Cisco Systems, Inc. is an American multinational technology conglomerate headquartered in San Jose, California, in the center of Silicon Valley, that develops, manufactures and sells networking hardware, telecommunications equipment and other high-technology services and products.

New!!: Wireless security and Cisco Systems · See more »

Common Criteria

The Common Criteria for Information Technology Security Evaluation (abbreviated as Common Criteria or CC) is an international standard (ISO/IEC 15408) for computer security certification.

New!!: Wireless security and Common Criteria · See more »

Computer network

A computer network, or data network, is a digital telecommunications network which allows nodes to share resources.

New!!: Wireless security and Computer network · See more »

Data link layer

The data link layer, or layer 2, is the second layer of the seven-layer OSI model of computer networking.

New!!: Wireless security and Data link layer · See more »

Denial-of-service attack

In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

New!!: Wireless security and Denial-of-service attack · See more »

Diceware

Diceware is a method for creating passphrases, passwords, and other cryptographic variables using ordinary dice as a hardware random number generator.

New!!: Wireless security and Diceware · See more »

Dictionary attack

In cryptanalysis and computer security, a dictionary attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying hundreds or sometimes millions of likely possibilities, such as words in a dictionary.

New!!: Wireless security and Dictionary attack · See more »

Dongle

A dongle is a small piece of hardware that connects to another device to provide it with additional functionality.

New!!: Wireless security and Dongle · See more »

Dynamic Host Configuration Protocol

The Dynamic Host Configuration Protocol (DHCP) is a network management protocol used on UDP/IP networks whereby a DHCP server dynamically assigns an IP address and other network configuration parameters to each device on a network so they can communicate with other IP networks.

New!!: Wireless security and Dynamic Host Configuration Protocol · See more »

Electromagnetic shielding

Electromagnetic shielding is the practice of reducing the electromagnetic field in a space by blocking the field with barriers made of conductive or magnetic materials.

New!!: Wireless security and Electromagnetic shielding · See more »

Encryption

In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.

New!!: Wireless security and Encryption · See more »

End-to-end encryption

End-to-end encryption (E2EE) is a system of communication where only the communicating users can read the messages.

New!!: Wireless security and End-to-end encryption · See more »

Ettercap (software)

Ettercap is a free and open source network security tool for man-in-the-middle attacks on LAN.

New!!: Wireless security and Ettercap (software) · See more »

Extensible Authentication Protocol

Extensible Authentication Protocol, or EAP, is an authentication framework frequently used in wireless networks and point-to-point connections.

New!!: Wireless security and Extensible Authentication Protocol · See more »

Federal Bureau of Investigation

The Federal Bureau of Investigation (FBI), formerly the Bureau of Investigation (BOI), is the domestic intelligence and security service of the United States, and its principal federal law enforcement agency.

New!!: Wireless security and Federal Bureau of Investigation · See more »

FIPS 140-2

The Federal Information Processing Standard (FIPS) Publication 140-2, (FIPS PUB 140-2), is a U.S. government computer security standard used to approve cryptographic modules.

New!!: Wireless security and FIPS 140-2 · See more »

Firmware

In electronic systems and computing, firmware is a specific class of computer software that provides the low-level control for the device's specific hardware.

New!!: Wireless security and Firmware · See more »

FreeRADIUS

FreeRADIUS is a modular, high performance free RADIUS suite developed and distributed under the GNU General Public License, version 2, and is free for download and use.

New!!: Wireless security and FreeRADIUS · See more »

GNU Privacy Guard

GNU Privacy Guard (GnuPG or GPG) is a free software replacement for Symantec's PGP cryptographic software suite.

New!!: Wireless security and GNU Privacy Guard · See more »

Hot Standby Router Protocol

In computer networking, the Hot Standby Router Protocol (HSRP) is a Cisco proprietary redundancy protocol for establishing a fault-tolerant default gateway.

New!!: Wireless security and Hot Standby Router Protocol · See more »

Hotspot (Wi-Fi)

A hotspot is a physical location where people may obtain Internet access, typically using Wi-Fi technology, via a wireless local area network (WLAN) using a router connected to an internet service provider.

New!!: Wireless security and Hotspot (Wi-Fi) · See more »

IEEE 802.11

IEEE 802.11 is a set of media access control (MAC) and physical layer (PHY) specifications for implementing wireless local area network (WLAN) computer communication in the 900 MHz and 2.4, 3.6, 5, and 60 GHz frequency bands.

New!!: Wireless security and IEEE 802.11 · See more »

IEEE 802.11i-2004

IEEE 802.11i-2004, or 802.11i for short, is an amendment to the original IEEE 802.11, implemented as Wi-Fi Protected Access II (WPA2).

New!!: Wireless security and IEEE 802.11i-2004 · See more »

IEEE 802.1X

IEEE 802.1X is an IEEE Standard for port-based Network Access Control (PNAC).

New!!: Wireless security and IEEE 802.1X · See more »

IEEE Standards Association

The Institute of Electrical and Electronics Engineers Standards Association (IEEE-SA) is an organization within IEEE that develops global standards in a broad range of industries, including: power and energy, biomedical and health care, information technology and robotics, telecommunication and home automation, transportation, nanotechnology, information assurance, and many more.

New!!: Wireless security and IEEE Standards Association · See more »

Institute of Electrical and Electronics Engineers

The Institute of Electrical and Electronics Engineers (IEEE) is a professional association with its corporate office in New York City and its operations center in Piscataway, New Jersey.

New!!: Wireless security and Institute of Electrical and Electronics Engineers · See more »

International Data Group

International Data Group, Inc. (IDG) is a Chinese-owned, American-based media, data and marketing services and venture capital organization.

New!!: Wireless security and International Data Group · See more »

Internet Authentication Service

Internet Authentication Service (IAS) is a component of Windows Server operating systems that provides centralized user authentication, authorization and accounting.

New!!: Wireless security and Internet Authentication Service · See more »

Internet Connection Sharing

Internet Connection Sharing (ICS) is a Windows service that enables one Internet-connected computer to share its Internet connection with other computers on a local area network (LAN).

New!!: Wireless security and Internet Connection Sharing · See more »

Internet traffic

Internet traffic is the flow of data across the Internet.

New!!: Wireless security and Internet traffic · See more »

IP address

An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.

New!!: Wireless security and IP address · See more »

IPsec

In computing, Internet Protocol Security (IPsec) is a secure network protocol suite of IPv4 that authenticates and encrypts the packets of data sent over an IPv4 network.

New!!: Wireless security and IPsec · See more »

Ipsectrace

ipsectrace is a software tool designed by Wayne Schroeder to help profile ipsec connections in a packet capture (PCP) file.

New!!: Wireless security and Ipsectrace · See more »

Kismet (software)

Kismet is a network detector, packet sniffer, and intrusion detection system for 802.11 wireless LANs.

New!!: Wireless security and Kismet (software) · See more »

KRACK

KRACK ("Key Reinstallation Attack") is a severe replay attack (a type of exploitable flaw) on the Wi-Fi Protected Access protocol that secures Wi-Fi connections.

New!!: Wireless security and KRACK · See more »

Layer 2 Tunneling Protocol

In computer networking, Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs.

New!!: Wireless security and Layer 2 Tunneling Protocol · See more »

Lightweight Directory Access Protocol

The Lightweight Directory Access Protocol (LDAP) is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network.

New!!: Wireless security and Lightweight Directory Access Protocol · See more »

Linux

Linux is a family of free and open-source software operating systems built around the Linux kernel.

New!!: Wireless security and Linux · See more »

List of router firmware projects

List of software created and maintained by people other than the manufacturer of the product.

New!!: Wireless security and List of router firmware projects · See more »

Local area network

A local area network (LAN) is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building.

New!!: Wireless security and Local area network · See more »

MAC address

A media access control address (MAC address) of a device is a unique identifier assigned to a network interface controller (NIC) for communications at the data link layer of a network segment.

New!!: Wireless security and MAC address · See more »

MAC filtering

In computer networking, Media Access Control MAC Filtering (or EUI filtering, or layer 2 address filtering) refers to a security access control method whereby the 48-bit address assigned to each network card is used to determine access to the network.

New!!: Wireless security and MAC filtering · See more »

MAC spoofing

MAC spoofing is a technique for changing a factory-assigned Media Access Control (MAC) address of a network interface on a networked device.

New!!: Wireless security and MAC spoofing · See more »

MacOS

macOS (previously and later) is a series of graphical operating systems developed and marketed by Apple Inc. since 2001.

New!!: Wireless security and MacOS · See more »

Man-in-the-middle attack

In cryptography and computer security, a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.

New!!: Wireless security and Man-in-the-middle attack · See more »

McGraw-Hill Education

McGraw-Hill Education (MHE) is a learning science company and one of the "big three" educational publishers that provides customized educational content, software, and services for pre-K through postgraduate education.

New!!: Wireless security and McGraw-Hill Education · See more »

Microsoft TechNet

Microsoft TechNet is a Microsoft web portal and web service for IT professionals.

New!!: Wireless security and Microsoft TechNet · See more »

Microsoft Windows

Microsoft Windows is a group of several graphical operating system families, all of which are developed, marketed, and sold by Microsoft.

New!!: Wireless security and Microsoft Windows · See more »

Mobile security

Mobile security, or more specifically mobile device security, has become increasingly important in mobile computing.

New!!: Wireless security and Mobile security · See more »

NetIQ eDirectory

eDirectory is an X.500-compatible directory service software product from NetIQ.

New!!: Wireless security and NetIQ eDirectory · See more »

Network layer

In the seven-layer OSI model of computer networking, the network layer is layer 3.

New!!: Wireless security and Network layer · See more »

Network security

Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

New!!: Wireless security and Network security · See more »

Open Shortest Path First

Open Shortest Path First (OSPF) is a routing protocol for Internet Protocol (IP) networks.

New!!: Wireless security and Open Shortest Path First · See more »

Packet analyzer

A packet analyzer (also known as a packet sniffer) is a computer program or piece of computer hardware that can intercept and log traffic that passes over a digital network or part of a network.

New!!: Wireless security and Packet analyzer · See more »

Passphrase

A passphrase is a sequence of words or other text used to control access to a computer system, program or data.

New!!: Wireless security and Passphrase · See more »

Payment card industry

The payment card industry (PCI) denotes the debit, credit, prepaid, e-purse, ATM, and POS cards and associated businesses.

New!!: Wireless security and Payment card industry · See more »

Payment Card Industry Data Security Standard

Ebt can pin card number 5077190291713960 The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard for organizations that handle branded credit cards from the major card schemes.

New!!: Wireless security and Payment Card Industry Data Security Standard · See more »

Payment Card Industry Security Standards Council

The Payment Card Industry Security Standards Council was originally formed by American Express, Discover Financial Services, JCB International, MasterCard and Visa Inc. on 7 September 2006, with the goal of managing the ongoing evolution of the Payment Card Industry Data Security Standard.

New!!: Wireless security and Payment Card Industry Security Standards Council · See more »

PC Card

In computing, PC Card is a configuration for computer parallel communication peripheral interface, designed for laptop computers.

New!!: Wireless security and PC Card · See more »

Personal digital assistant

A personal digital assistant (PDA), also known as a handheld PC, is a variety mobile device which functions as a personal information manager.

New!!: Wireless security and Personal digital assistant · See more »

Personal identification number

A personal identification number (PIN, pronounced "pin"; is often spoken out loud "PIN number" by mistake) is a numeric or alpha-numeric password or code used in the process of authenticating or identifying a user to a system and system to a user.

New!!: Wireless security and Personal identification number · See more »

Piggybacking (Internet access)

Piggybacking on Internet access is the practice of establishing a wireless Internet connection by using another subscriber's wireless Internet access service without the subscriber's explicit permission or knowledge.

New!!: Wireless security and Piggybacking (Internet access) · See more »

Point-to-Point Tunneling Protocol

The Point-to-Point Tunneling Protocol (PPTP) is an obsolete method for implementing virtual private networks, with many known security issues.

New!!: Wireless security and Point-to-Point Tunneling Protocol · See more »

Pre-shared key

In cryptography, a pre-shared key (PSK) is a shared secret which was previously shared between the two parties using some secure channel before it needs to be used.

New!!: Wireless security and Pre-shared key · See more »

Pretty Good Privacy

Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication.

New!!: Wireless security and Pretty Good Privacy · See more »

Privilege (computing)

In computing, privilege is defined as the delegation of authority over a computer system.

New!!: Wireless security and Privilege (computing) · See more »

Public key certificate

In cryptography, a public key certificate, also known as a digital certificate or identity certificate, is an electronic document used to prove the ownership of a public key.

New!!: Wireless security and Public key certificate · See more »

RADIUS

Remote Authentication Dial-In User Service (RADIUS) is a networking protocol, operating on port 1812 that provides centralized Authentication, Authorization, and Accounting (AAA or Triple A) management for users who connect and use a network service.

New!!: Wireless security and RADIUS · See more »

Rogue access point

A rogue access point is a wireless access point that has been installed on a secure network without explicit authorization from a local network administrator, whether added by a well-meaning employee or by a malicious attacker.

New!!: Wireless security and Rogue access point · See more »

Router (computing)

A router is a networking device that forwards data packets between computer networks.

New!!: Wireless security and Router (computing) · See more »

Routing Information Protocol

The Routing Information Protocol (RIP) is one of the oldest distance-vector routing protocols which employ the hop count as a routing metric.

New!!: Wireless security and Routing Information Protocol · See more »

RSA Security

RSA Security LLC, formerly RSA Security, Inc. and doing business as RSA, is an American computer and network security company.

New!!: Wireless security and RSA Security · See more »

Script kiddie

In programming and hacking culture, a script kiddie or skiddie is an unskilled individual who uses scripts or programs developed by others to attack computer systems and networks and deface websites.

New!!: Wireless security and Script kiddie · See more »

Secure Shell

Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.

New!!: Wireless security and Secure Shell · See more »

Service set (802.11 network)

In IEEE 802.11 wireless local area networking standards, a service set is a group of wireless network devices that are operating with the same networking parameters.

New!!: Wireless security and Service set (802.11 network) · See more »

Smart card

A smart card, chip card, or integrated circuit card (ICC), is any pocket-sized card that has embedded integrated circuits.

New!!: Wireless security and Smart card · See more »

Software

Computer software, or simply software, is a generic term that refers to a collection of data or computer instructions that tell the computer how to work, in contrast to the physical hardware from which the system is built, that actually performs the work.

New!!: Wireless security and Software · See more »

Spanning Tree Protocol

The Spanning Tree Protocol (STP) is a network protocol that builds a loop-free logical topology for Ethernet networks.

New!!: Wireless security and Spanning Tree Protocol · See more »

Stealth wallpaper

Stealth wallpaper is a material designed to prevent an indoor Wi-Fi network from extending or "leaking" to the outside of a building, where malicious persons may attempt to eavesdrop or attack a network.

New!!: Wireless security and Stealth wallpaper · See more »

TechRepublic

TechRepublic is an online trade publication and social community for IT professionals, with advice on best practices and tools for the day-to-day needs of IT decision-makers.

New!!: Wireless security and TechRepublic · See more »

Tempest (codename)

TEMPEST is a National Security Agency specification and a NATO certification referring to spying on information systems through leaking emanations, including unintentional radio or electrical signals, sounds, and vibrations.

New!!: Wireless security and Tempest (codename) · See more »

Temporal Key Integrity Protocol

Temporal Key Integrity Protocol or TKIP is a security protocol used in the IEEE 802.11 wireless networking standard.

New!!: Wireless security and Temporal Key Integrity Protocol · See more »

TJ Maxx

TJ Maxx (often stylized as T•J•maxx) is an American department store chain, selling at prices generally lower than other major similar stores.

New!!: Wireless security and TJ Maxx · See more »

Transport Layer Security

Transport Layer Security (TLS) – and its predecessor, Secure Sockets Layer (SSL), which is now deprecated by the Internet Engineering Task Force (IETF) – are cryptographic protocols that provide communications security over a computer network.

New!!: Wireless security and Transport Layer Security · See more »

Trojan horse (computing)

In computing, a Trojan horse, or Trojan, is any malicious computer program which misleads users of its true intent.

New!!: Wireless security and Trojan horse (computing) · See more »

USB

USB (abbreviation of Universal Serial Bus), is an industry standard that was developed to define cables, connectors and protocols for connection, communication, and power supply between personal computers and their peripheral devices.

New!!: Wireless security and USB · See more »

Virtual private network

A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

New!!: Wireless security and Virtual private network · See more »

White hat (computer security)

The term "white hat" in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems.

New!!: Wireless security and White hat (computer security) · See more »

Wi-Fi Alliance

Wi-Fi Alliance is a non-profit organization that promotes Wi-Fi technology and certifies Wi-Fi products if they conform to certain standards of interoperability.

New!!: Wireless security and Wi-Fi Alliance · See more »

Wi-Fi Protected Access

Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks.

New!!: Wireless security and Wi-Fi Protected Access · See more »

WikiHow

wikiHow is an online wiki-style community consisting of an extensive database of how-to guides.

New!!: Wireless security and WikiHow · See more »

Wired Equivalent Privacy

Wired Equivalent Privacy (WEP) is a security algorithm for IEEE 802.11 wireless networks.

New!!: Wireless security and Wired Equivalent Privacy · See more »

Wireless

Wireless communication, or sometimes simply wireless, is the transfer of information or power between two or more points that are not connected by an electrical conductor.

New!!: Wireless security and Wireless · See more »

Wireless access point

20018 In computer networking, a wireless access point (WAP), or more generally just access point (AP), is a networking hardware device that allows a Wi-Fi device to connect to a wired network.

New!!: Wireless security and Wireless access point · See more »

Wireless community network

Wireless community networks or wireless community projects are the organizations that attempt to take a grassroots approach to providing a viable alternative to municipal wireless networks for consumers.

New!!: Wireless security and Wireless community network · See more »

Wireless gateway

A wireless gateway routes packets from a wireless LAN to another network, wired or wireless WAN.

New!!: Wireless security and Wireless gateway · See more »

Wireless intrusion prevention system

In computing, a wireless intrusion prevention system (WIPS) is a network device that monitors the radio spectrum for the presence of unauthorized access points (intrusion detection), and can automatically take countermeasures (intrusion prevention).

New!!: Wireless security and Wireless intrusion prevention system · See more »

Wireless LAN

A wireless local area network (WLAN) is a wireless computer network that links two or more devices using wireless communication within a limited area such as a home, school, computer laboratory, or office building.

New!!: Wireless security and Wireless LAN · See more »

Wireless network interface controller

A wireless network interface controller (WNIC) is a network interface controller which connects to a wireless radio-based computer network, rather than a wired network, such as Token Ring or Ethernet.

New!!: Wireless security and Wireless network interface controller · See more »

Wireless Public Key Infrastructure

Wireless Public Key Infrastructure (WPKI) is a technology that provides public key infrastructure functionality using a mobile Secure Element such as a SIM card.

New!!: Wireless security and Wireless Public Key Infrastructure · See more »

Wireless router

An early example of a wireless router A wireless router is a device that performs the functions of a router and also includes the functions of a wireless access point.

New!!: Wireless security and Wireless router · See more »

Xsupplicant

Xsupplicant is a supplicant that allows a workstation to authenticate with a RADIUS server using 802.1X and the Extensible Authentication Protocol (EAP).

New!!: Wireless security and Xsupplicant · See more »

Redirects here:

Network encryption, Network injection, WLAN security, WiFi Security, Wireless Encryption, Wireless Internet Security, Wireless LAN Security, Wireless LAN security, Wireless encryption.

References

[1] https://en.wikipedia.org/wiki/Wireless_security

OutgoingIncoming
Hey! We are on Facebook now! »