The FREE Cybersecurity Glossary by Thor Pedersen!

Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.

- Wi-Fi Protected Access 2 (WPA2)
Wi-Fi Protected Access 2 (WPA2): A security protocol and a current industry standard that is used to safeguard wireless networks. It improves upon its predecessor, WPA, by introducing a more secure encryption method known as the Advanced Encryption Standard (AES) and a robust integrity check known as CCMP (Counter Cipher Mode with Block Chaining Message Authentication Code Protocol). These features ensure that network traffic is secure from unauthorized access, interception, and tampering.
- Wi-Fi Protected Access (WPA)
Wi-Fi Protected Access (WPA): A security protocol designed to secure wireless (Wi-Fi) networks. Introduced as an improvement over the previous Wired Equivalent Privacy (WEP), WPA provides robust security through encryption and user authentication. WPA2 and WPA3, the later versions of this protocol, utilize Advanced Encryption Standard (AES) technology and offer improved security features to protect network traffic from eavesdropping and other forms of attacks.
- Wi-Fi Protected Setup (WPS)
Wi-Fi Protected Setup (WPS): A security feature that simplifies the process of setting up a wireless network and connecting devices to it. Used in home and office networks to make it easier for users to connect their devices. Examples include a WPS button on a router or a WPS PIN on a device.
- Wi-Fi War Droning
Wi-Fi War Droning: An activity where a drone equipped with a Wi-Fi scanner or hacker toolkit is used to identify and potentially exploit vulnerabilities in wireless networks. The mobility and compactness of drones enable them to reach locations that might be difficult for a human to access, allowing a wide or targeted search for unsecured or weakly secured networks. This activity can be used either for malicious intent or for legitimate purposes like security audits and penetration testing.
- Wi-Fi Zones (Coverage Areas)
Wi-Fi Zones (Coverage Areas): The delineated areas within the range of a wireless network where devices can connect and communicate over Wi-Fi. Networks often overlap multiple zones, enabling seamless connectivity as users move around. Each zone corresponds to the signal range of a Wireless Access Point (WAP).
- Windows Registry
Windows Registry: A database of system settings and configurations in the Microsoft Windows operating system. It is used to store information such as software installation paths, user preferences, and hardware settings. Examples of registry keys include the HKEY_LOCAL_MACHINE and HKEY_CURRENT_USER keys.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
2,500 CISSP Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
A 200-page CISM study guide
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
A 120-page CC study guide
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access