Term
|
Definition
| An advanced security encryption protocol used in the Wi-Fi protected Access 2 (WPA2) standard |
|
|
Term
| Association request frame |
|
Definition
| A frame that carries information about the data rules that the device can support along with the Service Set Identifier (SSID) of the network it wants to join. |
|
|
Term
|
Definition
| A server whose only job is to verify the authentication of devices |
|
|
Term
|
Definition
| Text that is used in shared key authentication to authenticate a device |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Two packets derived from the same initialization vector (IV) |
|
|
Term
| Cyclic redundancy check (CRC) |
|
Definition
| A checksum based on the contents of the text |
|
|
Term
|
Definition
| Associating with a new access point |
|
|
Term
|
Definition
| An 1999 amendment with a maximum rated speed of 54 Mbps using the 5 GHz spectrum |
|
|
Term
|
Definition
| A 1999 amendment to the 802.11 standard that added two higher speeds (5.5 mbps and ll mbps) |
|
|
Term
|
Definition
| A standard formally ratified in 2003 for wireless LAN transmissions of devices transmitting at 54 Mbps |
|
|
Term
|
Definition
| The 2004 wireless security standard that addresses the two main weaknesses of wireless networks, encryption and authentication |
|
|
Term
|
Definition
| A proposed standard for faster wireless LANs projected to be ratified in 2009 |
|
|
Term
|
Definition
| A standard originally developed for wired networks that provides a greater degree of security for wireless networks by implementing port-based authentication. |
|
|
Term
| Initialization Vector (IV) |
|
Definition
| A 24 bit balue that changes each time a packet is encrypted suing Wired Equivalent Privacy (WEP) |
|
|
Term
| Institute of Eletrical and Electronics Engineers (IEEE) |
|
Definition
| An organization that sets standards for computer networking and wireless communications. |
|
|
Term
| Integrity check value (ICV) |
|
Definition
| A checksum based on the contents of the text, used in WEP encryption |
|
|
Term
|
Definition
| Storing information from a device on the network so if so if a user roams away from a wireless access point and later returns he does not need to reenter all of the credentials |
|
|
Term
|
Definition
| a series of 1's and 0's equal in length to the text to be encrypted with Wired Equivalent Privacy (WEP) plus the integrity check value (ICV) |
|
|
Term
|
Definition
| An attack that attempts to determine the keystream by analyzing two packets that were created from the same initialization vector (IV) |
|
|
Term
| Message Integrity Check (MIC) |
|
Definition
| A protocol designed to prevent an a attacker from capturing, altering and resending data packets. |
|
|
Term
| Open Systems Authentication |
|
Definition
| The default method of authentication used by the IEEE 802.11 standard |
|
|
Term
|
Definition
| Scanning for a wireless device that listens for a beacon frame for a set period of time. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| A technology that allows a device to become authenticated to an access point before moving into its range |
|
|
Term
|
Definition
| An authentication protocol that uses a passphrase to generate the encryption key and must be created and entered into both the access point and all wireless devices prior to the devices communicating |
|
|
Term
|
Definition
| a cipher algorithm used in Wired Equivalent Privacy (WEP) that takes one character and replaces it with one character. |
|
|
Term
|
Definition
| movement between cells of a wireless local area network |
|
|
Term
| Service Set Identifier (SSID) |
|
Definition
| The network name for the wireless network that can be any alphanumeric string fro 2 to 32 characters |
|
|
Term
| Shared key authentication |
|
Definition
| An optional Wired Encryption Privacy (WEP) authentication that uses challenge text for authentication |
|
|
Term
| Temporal Key Integrity Protocol(TKIP) |
|
Definition
| An encryption technology that replaces the Wired Equivalent Privacy (WEP) protocol |
|
|
Term
|
Definition
| An access point with limited functionality (it does not provide authentication or encryption) |
|
|
Term
| Wi-Fi (Wireless Fidelity) Alliance |
|
Definition
| A consortium of wireless equipment manufacturers and software providers to promote wireless network technology |
|
|
Term
|
Definition
| The first set of standards set by the WiFi Alliance |
|
|
Term
| WiFi Protected Access 2 (WPA 2) |
|
Definition
| The second generation of WiFi protected access (WPA) security |
|
|
Term
|
Definition
| The encryption mechanism of the IEEE 802.11 standard, considered to provide only low security |
|
|
Term
|
Definition
| A device that can monitor the airwaves for traffic |
|
|
Term
|
Definition
| A switch that contains authentication and encryption for wireless networks |
|
|