Wide Area Network
Wide Area Network
Setting up a fake website (or compromising a real one) in order to infect and exploit visiting users.
Web Content Management
A technique used in non-volatile flash memory media to prolong the life of the media. As data can be written to and erased from memory blocks a finite number of times, wear-levelling helps to distribute writes evenly across each memory block, thereby decreasing wear and increasing its lifetime.
AKA wearables
A reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it. Formally a Uniform Resource Locator (URL).
In computing, a client-server computer program that the client runs in a web browser.
A video camera connected to a computer, allowing its images to be seen by internet users.
Illegitimate changes made to the appearance and content of a website. Often likened to graffiti or online vandalism.
Wired Equivalent Privacy
A highly-targeted form of spearphishing that is aimed at senior executives within an organisation.
An ethical computer hacker, or a computer security expert, who specialises in penetration testing and in other testing methodologies to legally and legitimately ensure the security of an organisation's information systems. See also ‘black hat’ and ‘grey hat’.
A set of wireless communication protocols that can transmit traffic to Wi-Fi enabled devices within a local area. A Wi-Fi enabled device such as a laptop or mobile device can connect to the internet when within range of a wireless network connected to the internet. An area covered by one or more Wi-Fi access points is commonly called a hotspot.
A protocol designed for communicating data over wireless networks.
A protocol designed to replace the Wi-Fi Protected Access protocol for communicating data over wireless networks.
A protocol designed to replace the WPA2 protocol for communicating data over wireless networks.
A telecommunications network or computer network that extends over a large geographical distance.
A crime in which a person concocts a scheme to defraud or obtain money based on false representation or promises.
Telecommunication involving signals transmitted by radio waves rather than over wires, also: the technology used in radio telecommunication.
A device which enables communications between wireless clients. It is typically also the device which connects wired and wireless networks.
The transmission of data over a communications path using electromagnetic waves rather than a wired medium.
A wireless distribution method for two or more devices that use radio communications and often includes an access point to the internet.
A network based on the 802.11 standards.
An organisation that supports women in their science, technology, engineering or maths (STEM) careers. They help women by educating high school girls about the opportunities in STEM, as well as providing networking and education for professionals.
A stand-alone or networked single-user computer.
Self-replicating malware that uses a network to distribute copies of itself to other computer devices, often without user intervention. Worms need not attach themselves to existing programs.