Shared Flashcard Set

Details

IT284 Unit 7 Glossary of Terms
Terms for Unit 7- IT284
62
Computer Science
Undergraduate 2
08/22/2010

Additional Computer Science Flashcards

 


 

Cards

Term
Ad hoc mode
Definition
A wireless network that does not use an access point. Also known as peer-topeer mode or Independent Basic Service Set (IBSS).
Term
ATIM (Ad hoc Traffic Indication Message) window
Definition
A specific period of time at which each ad hoc device must be awake.
Term
Association
Definition
The process of being accepted into the wireless network.
Term
Authentication
Definition
A process in which the AP accepts or rejects a wireless device.
Term
Authentication server
Definition
A server on an IEEE 802.1x network that verifies the authentication of devices.
Term
BSA (Basic Service Area)
Definition
The geographical area of coverage for a WLAN.
Term
BSS (Basic Service Set)
Definition
A group of wireless devices that is served by a single access point (AP).
Term
Beaconing
Definition
The process of an AP in an infrastructure network or wireless device in an ad hoc network sending a beacon frame to both announce its presence and to provide the necessary information for other devices to join the network.
Term
Buffering
Definition
The process of an access point temporarily storing frames for wireless devices that are asleep.
Term
Brute force attack
Definition
An attack in which an attacker attempts to create every possible key combination by systematically changing one character at a time in a possible key.
Term
Cipher
Definition
An encryption algorithm.
Term
Ciphertext
Definition
An encrypted message.
Term
Collision
Definition
In wireless security, two packets that were created from the same initialization vector (IV).
Term
Computer spy
Definition
A person who has been hired to break into a computer and steal information.
Term
Cracker
Definition
A person who violates system security with malicious intent.
Term
Cryptography
Definition
The science of transforming information so that it is secure while it is being transmitted or stored.
Term
Cyberterrorists
Definition
Terrorists who attack networks and computer infrastructures in order to cause panic.
Term
CRC (Cyclic Redundancy Check)
Definition
A checksum value that is based on the contents of the text.
Term
Care-of address
Definition
A new IP address on a foreign network.
Term
CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance)
Definition
A protocol designed to avoid collisions on a wireless medium.
Term
CSMA/CD (Carrier Sense Multiple Access with Collision Detection)
Definition
A contention-based channel access method used by 802.3 Ethernet networks.
Term
Carrier sensing
Definition
The process of listening on a network medium prior to transmitting.
Term
Challenge text
Definition
A block of text that must be encrypted by a wireless device in shared key authentication.
Term
Channel access methods
Definition
Different ways of sharing a network medium.
Term
Contention
Definition
A channel access method in which devices compete with each other to use the network medium.
Term
DCF (Distributed Coordination Function)
Definition
An IEEE 802.11 standard for sharing the wireless medium.
Term
DIFS (Distributed Coordination Function IFS)
Definition
An interframe space that is the standard interval between the transmission of data frames.
Term
Default key
Definition
A key value that is used to encrypt wireless data transmissions when they are sent.
Term
DoS (Denial of Service) attack
Definition
An attack that attempts to make a server or other network device unavailable by flooding it with requests.
Term
Dictionary attack
Definition
An attack that takes each word from a dictionary and encodes it in the same way a passphrase was encoded.
Term
ESS (Extended Service Set)
Definition
Two or more BSS networks that are connected through a common distribution system.
Term
Foreign agent
Definition
A forwarding mechanism in Mobile IP.
Term
Foreign network
Definition
Another network on a Mobile IP service.
Term
Hidden node problem
Definition
A wireless device that can be seen by an access point but not by all other wireless devices.
Term
Home agent
Definition
A forwarding mechanism in Mobile IP that keeps track of where a mobile computer is located.
Term
IBSS (Independent Basic Service Set)
Definition
A wireless network that does not use an access point. Also known as ad hoc or peer-to-peer mode.
Term
Infrastructure mode
Definition
A group of wireless devices that is served by a single access point (AP).
Term
Key
Definition
The value that an algorithm uses to encrypt or decrypt a message.
Term
Keystream
Definition
The output from a pseudo-random number generator (PRNG).
Term
Keystream attack
Definition
An attack method to determining the keystream by analyzing two packets that were created from the same initialization vector (IV).
Term
Management frame
Definition
A type of MAC frame used to set up the initial communications between a device and the access point or between devices.
Term
Man-in-the-middle attack
Definition
An attack that intercepts communication from one device and sends a substitute communication to the intended receiver.
Term
MAC (Media Access Control) address filtering
Definition
An access control method that restricts access based on the media access control (MAC) address.
Term
Mobile IP
Definition
A mechanism within the TCP/IP protocol to support mobile computing.
Term
Open system authentication
Definition
An authentication method in which a wireless device sends a request to the access point. The most basic and often default authentication method, it provides very little security.
Term
Peer-to-peer mode
Definition
A wireless network that does not use an access point.
Term
Polling
Definition
A channel access method in which each device is polled in sequence if it has frames to send.
Term
Plaintext
Definition
A message in an unencrypted format.
Term
Private key cryptography
Definition
Using the same shared secret key to both encrypt and decrypt messages.
Term
PRNG (Pseudo-Random Number Generator)
Definition
A part of the process for encrypting packages using WEP that generates a keystream.
Term
RC4
Definition
A cipher algorithm used in WEP.
Term
QoS (Quality of Service)
Definition
Prioritizing frames so that time-sensitive frames are transmitted prior to data frames.
Term
Reassociation
Definition
The process in which a device drops a connection with one access point and establishes a connection with another.
Term
Roaming
Definition
Movement between WLAN cells.
Term
Scanning
Definition
The process of a receiving wireless device looking for beacons.
Term
Script kiddies
Definition
Unskilled or novice attackers who break into computers to create damage.
Term
Stream cipher
Definition
A cipher that takes one character and replaces it with one character messages.
Term
SSID (Service Set Identifier)
Definition
A unique identifier of up to 32 characters that serves as a WLAN network name.
Term
Shared key authentication
Definition
An authentication method in which a wireless device must encrypt challenge text before it can be authenticated. This method is more secure than open system authentication, but still not entirely secure.
Term
VoIP (Voice over IP)
Definition
A telephony service that uses IP-based data packet switching networks to transmit voice communications.
Term
Weak key
Definition
A cryptographic key that creates a repeating pattern.
Term
WEP (Wired Equivalent Privacy)
Definition
An IEEE 802.11 cryptography mechanism.
Supporting users have an ad free experience!