Term
|
Definition
An advanced security encryption protocol used in the Wi-Fi protected Access 2 (WPA2) standard |
|
|
Term
Association request frame |
|
Definition
A frame that carries information about the data rules that the device can support along with the Service Set Identifier (SSID) of the network it wants to join. |
|
|
Term
|
Definition
A server whose only job is to verify the authentication of devices |
|
|
Term
|
Definition
Text that is used in shared key authentication to authenticate a device |
|
|
Term
|
Definition
|
|
Term
|
Definition
Two packets derived from the same initialization vector (IV) |
|
|
Term
Cyclic redundancy check (CRC) |
|
Definition
A checksum based on the contents of the text |
|
|
Term
|
Definition
Associating with a new access point |
|
|
Term
|
Definition
An 1999 amendment with a maximum rated speed of 54 Mbps using the 5 GHz spectrum |
|
|
Term
|
Definition
A 1999 amendment to the 802.11 standard that added two higher speeds (5.5 mbps and ll mbps) |
|
|
Term
|
Definition
A standard formally ratified in 2003 for wireless LAN transmissions of devices transmitting at 54 Mbps |
|
|
Term
|
Definition
The 2004 wireless security standard that addresses the two main weaknesses of wireless networks, encryption and authentication |
|
|
Term
|
Definition
A proposed standard for faster wireless LANs projected to be ratified in 2009 |
|
|
Term
|
Definition
A standard originally developed for wired networks that provides a greater degree of security for wireless networks by implementing port-based authentication. |
|
|
Term
Initialization Vector (IV) |
|
Definition
A 24 bit balue that changes each time a packet is encrypted suing Wired Equivalent Privacy (WEP) |
|
|
Term
Institute of Eletrical and Electronics Engineers (IEEE) |
|
Definition
An organization that sets standards for computer networking and wireless communications. |
|
|
Term
Integrity check value (ICV) |
|
Definition
A checksum based on the contents of the text, used in WEP encryption |
|
|
Term
|
Definition
Storing information from a device on the network so if so if a user roams away from a wireless access point and later returns he does not need to reenter all of the credentials |
|
|
Term
|
Definition
a series of 1's and 0's equal in length to the text to be encrypted with Wired Equivalent Privacy (WEP) plus the integrity check value (ICV) |
|
|
Term
|
Definition
An attack that attempts to determine the keystream by analyzing two packets that were created from the same initialization vector (IV) |
|
|
Term
Message Integrity Check (MIC) |
|
Definition
A protocol designed to prevent an a attacker from capturing, altering and resending data packets. |
|
|
Term
Open Systems Authentication |
|
Definition
The default method of authentication used by the IEEE 802.11 standard |
|
|
Term
|
Definition
Scanning for a wireless device that listens for a beacon frame for a set period of time. |
|
|
Term
|
Definition
|
|
Term
|
Definition
A technology that allows a device to become authenticated to an access point before moving into its range |
|
|
Term
|
Definition
An authentication protocol that uses a passphrase to generate the encryption key and must be created and entered into both the access point and all wireless devices prior to the devices communicating |
|
|
Term
|
Definition
a cipher algorithm used in Wired Equivalent Privacy (WEP) that takes one character and replaces it with one character. |
|
|
Term
|
Definition
movement between cells of a wireless local area network |
|
|
Term
Service Set Identifier (SSID) |
|
Definition
The network name for the wireless network that can be any alphanumeric string fro 2 to 32 characters |
|
|
Term
Shared key authentication |
|
Definition
An optional Wired Encryption Privacy (WEP) authentication that uses challenge text for authentication |
|
|
Term
Temporal Key Integrity Protocol(TKIP) |
|
Definition
An encryption technology that replaces the Wired Equivalent Privacy (WEP) protocol |
|
|
Term
|
Definition
An access point with limited functionality (it does not provide authentication or encryption) |
|
|
Term
Wi-Fi (Wireless Fidelity) Alliance |
|
Definition
A consortium of wireless equipment manufacturers and software providers to promote wireless network technology |
|
|
Term
|
Definition
The first set of standards set by the WiFi Alliance |
|
|
Term
WiFi Protected Access 2 (WPA 2) |
|
Definition
The second generation of WiFi protected access (WPA) security |
|
|
Term
|
Definition
The encryption mechanism of the IEEE 802.11 standard, considered to provide only low security |
|
|
Term
|
Definition
A device that can monitor the airwaves for traffic |
|
|
Term
|
Definition
A switch that contains authentication and encryption for wireless networks |
|
|