war dialing - An attack in which a long list of phone numbers is inserted into a war-dialing program in the hope of finding a modem that can be exploited to gain unauthorized access.

waterfall developmet methodology - A development model in which each phase contains a list of activities that must be performed and documented before the next phase begins.

well-known ports - Ports 0

white-box testing - A design that allows one to peek inside the

whitelist - A set of known good resources such as IP addresses, domain names, or applications.

Wi-Fi - (Wireless Fidelity) -Primarily associated with computer networking, Wi-Fi uses the IEEE 802.11x specification to create a wireless local-area network either public or private.

wireless fidelity - Primarily associated with computer networking, Wi-Fi uses the IEEE 802.11x specification to create a wireless local-area network either public or private.

work factor - The estimated time and effort required for an attacker to overcome a security control.

worldwide interoperability for microwave access - A family of wireless broadband communication standards based on the IEEE 802.16 set of standards, which provide multiple physical layer (PHY) and Media Access Control (MAC) options.

worm - An independent program that can reproduce by copying itself from one system to another. It may damage data directly or degrade system performance by tying up resources.

write - An operation that results in the flow of information from a subject to an object.

0 Shares
Share via
Copy link
Powered by Social Snap