A B C D E F G H I J K L M N O P Q R S T U V W X Z
*

W

WAN

Wide Area Network

Watering hole

Setting up a fake website (or compromising a real one) in order to infect and exploit visiting users.

WCM

Web Content Management

Wear levelling

A technique used in non-volatile flash memory media to prolong the life of the media. As data can be written to and erased from memory blocks a finite number of times, wear-levelling helps to distribute writes evenly across each memory block, thereby decreasing wear and increasing its lifetime.

Wearable smart devices

AKA wearables

Web address

A reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it. Formally a Uniform Resource Locator (URL).

Web applications

In computing, a client-server computer program that the client runs in a web browser.

Webcams

A video camera connected to a computer, allowing its images to be seen by internet users.

Website defacement

Illegitimate changes made to the appearance and content of a website. Often likened to graffiti or online vandalism.

WEP

Wired Equivalent Privacy

Whaling

A highly-targeted form of spearphishing that is aimed at senior executives within an organisation.

White hat

An ethical computer hacker, or a computer security expert, who specialises in penetration testing and in other testing methodologies to legally and legitimately ensure the security of an organisation's information systems. See also ‘black hat’ and ‘grey hat’.

Wi-Fi

A set of wireless communication protocols that can transmit traffic to Wi-Fi enabled devices within a local area. A Wi-Fi enabled device such as a laptop or mobile device can connect to the internet when within range of a wireless network connected to the internet. An area covered by one or more Wi-Fi access points is commonly called a hotspot.

Wi-Fi Protected Access (WPA)

A protocol designed for communicating data over wireless networks.

Wi-Fi Protected Access 2 (WPA2)

A protocol designed to replace the Wi-Fi Protected Access protocol for communicating data over wireless networks.

Wi-Fi Protected Access 3 (WPA3)

A protocol designed to replace the WPA2 protocol for communicating data over wireless networks.

Wide Area Network (WAN)

A telecommunications network or computer network that extends over a large geographical distance.

Wire fraud

A crime in which a person concocts a scheme to defraud or obtain money based on false representation or promises.

Wireless

Telecommunication involving signals transmitted by radio waves rather than over wires, also: the technology used in radio telecommunication.

Wireless Access Point (WAP)

A device which enables communications between wireless clients. It is typically also the device which connects wired and wireless networks.

Wireless communications

The transmission of data over a communications path using electromagnetic waves rather than a wired medium.

Wireless local area network (WLAN)

A wireless distribution method for two or more devices that use radio communications and often includes an access point to the internet.

Wireless network

A network based on the 802.11 standards.

Women in Technology

An organisation that supports women in their science, technology, engineering or maths (STEM) careers. They help women by educating high school girls about the opportunities in STEM, as well as providing networking and education for professionals.

Workstation

A stand-alone or networked single-user computer.

Worm

Self-replicating malware that uses a network to distribute copies of itself to other computer devices, often without user intervention. Worms need not attach themselves to existing programs.