Glossary of Cyber Security Terms

Essential Vocabulary for Navigating the World of Cyber Security

W

War Chalking

War chalking refers to the practice of physically marking locations, often with chalk, where open wireless network signals are accessible. These markings serve as public indicators for available Wi-Fi hotspots.

War Dialer

A war dialer is a software program designed to dial a range of phone numbers automatically, identifying those that are connected to computer systems. Once identified, these numbers are catalogued for future attempts to infiltrate the systems by malicious parties.

War Dialing

War dialing is the method of systematically dialing telephone numbers to locate modems attached to computer systems within a specific exchange. The intention is to uncover vulnerabilities that can be exploited, bypassing established security measures.

War Driving

War driving involves the act of physically moving around, typically in a vehicle, to detect and map the location of wireless access points. This activity is often conducted to exploit network vulnerabilities or simply to use the detected networks for internet access.

Web of Trust

The web of trust concept refers to the organic development of trust networks, where an individual begins to trust others based on trusted signatures and their endorsements. It's a decentralized approach to establishing authenticity and credibility within a digital community.

Web Server

A web server is a software application running on a host computer, serving web pages to users upon request via the HTTP protocol. It facilitates access to web content by interpreting and responding to requests from client web browsers.

WHOIS

WHOIS is a protocol used for querying databases that store information about various network resources. It allows users to identify who owns a domain or an IP address.

Windowing

In the context of graphical user interfaces (GUIs), a windowing system allows the sharing of a computer's graphical display resources among various applications simultaneously. With a separate window for each application, a user can switch between tasks without needing to restart applications. A window manager within the system manages the location, size, and status of each window on the screen.

Windump

Windump is a Windows-based freeware tool functioning as a network protocol analyzer. It monitors network traffic, providing detailed insights into the data transmitted over a network.

Wired Equivalent Privacy (WEP)

WEP is a security protocol defined in the IEEE 802.11b standard for wireless local area networks (WLANs). It was designed to provide a level of security comparable to that of a traditional wired network.

Wireless Application Protocol

The Wireless Application Protocol (WAP) is a standard that outlines communication protocols for wireless devices. It enables services such as internet access, email, and chat on devices like cell phones and radio transceivers.

Wiretapping

Wiretapping refers to the practice of covertly monitoring and recording data flowing between two points in a communication system. While it is often associated with telephone lines, it can be applied to digital communications as well.

World Wide Web (WWW or "the Web")

The World Wide Web is a vast, globally accessible network of interlinked documents and other resources, hosted on internet servers. It is navigated through the use of browsers and protocols such as HTTP.

Worm

In the context of computer security, a worm is a self-replicating program that independently propagates itself across a network. Unlike a virus, it does not need to attach itself to an existing program. Worms can be harmful, consuming network resources or performing destructive actions.