Term 
         | 
        
        
        Definition 
        
        | A wireless device that contains an antenna, a radio transmitter/receiver to send and receive wireless signals, and a port that allows it to connect to a wired network. |  
          | 
        
        
         | 
        
        
        Term 
        
        | Address Resolution Protocol (ARP) |  
          | 
        
        
        Definition 
        
        | The protocol used so that a device can determine the media access control address of another device based on its Internet Protocol address |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | An attack in which the media accesscontrol address in the ARP cache isa corrupted so that the corresponding Internet Protocol address points to a different device. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | An account that is secretly setup without the administrator's knowledge or permission, that cannot be detected, and that allows for remote access to the device. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | The process of the access point sending out at regular intervals information to announce its presence and to provide the necessary information for devices to join the wireless network. |  
          | 
        
        
         | 
        
        
        Term 
        
        | Berkeley Internet Name Domain (BIND) |  
          | 
        
        
        Definition 
        
        | An Internet naming system that performs name resolution. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | The act of sending unsolicited messages between Bluetooth to Bluetooth-enabled devices. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | The unauthorized access of information from a wireless device through a Bluetooth connection. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | A wireless technology that uses shortrange radio frequency transmissions. |  
          | 
        
        
         | 
        
        
        Term 
        
        | carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) |  
          | 
        
        
        Definition 
        
        | The IEEE 802.11 standard protocol for WLANs that attempts to prevent multiple wireless devices from transmitting at the same time. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | A user account that is created automatically instead of by the administrator. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | An attack that attempts to consume network resources so that the network or its devices cannot respond to legitimate requests. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | An antenna that detects signals from all directions equally (also called omnidirectional attenna). |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | A frame sent to a device to force it to temporarily disconnect from the wireless network. |  
          | 
        
        
         | 
        
        
        Term 
        
        | distributed denial of service (DDoS) |  
          | 
        
        
        Definition 
        
        | An attack that uses hundreds or thousands of zombie computers in a botnet to flood a device with requests. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | An attack that substitutes a Fraudulent address in a Domain Name System server. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
         | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | A request to a Domain Name System server that asks for a zone transfer. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | Fraud that takes advantage of a grace period to delete Internet Domain Names. |  
          | 
        
        
         | 
        
        
        Term 
        
        | Domain Name System Security Extensions (DNSSEC) |  
          | 
        
        
        Definition 
        
        | A new secure version of the Domain Name System server that uses advanced measures to determine the authenticity of of data. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | A hierarchical name system for matching computer names and numbers. |  
          | 
        
        
         | 
        
        
        Term 
        
        | global positioning system (GPS) |  
          | 
        
        
        Definition 
        
        | A navigation system that uses satellite communications to identify the precise location of a GPS receiver. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | A list stored on a local computer that contains the mappings of names to computer numbers. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | A system in which host tables are stored on the local computer. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | A technique that enables a computer to forward any network traffic it receives from another device. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | An attack that intercepts legitimate comniunication and forges a fictitious response to the sender. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | The device in a Bluetooth network that controls all wireless traffic. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | A system that allows computers on a network to be assigned both numeric addresses and humanreadable names. |  
          | 
        
        
         | 
        
        
        Term 
        
        | network tap (test access point) |  
          | 
        
        
        Definition 
        
        | A separate device that can be installed between two network devices, such as a switch, router, or firewall, to monitor traffic. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | Unauthenticated connections to a Microsoft Windows 2000 or Windows NT computer that do not require a username or a password. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | An antenna that detects signals from all directions equally. Also known as dipole antenna. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | A program that creates fake packets to flood the wireless network. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | A secret combination of letters and numbers that serve to authenticate (validate) a user by what he knows. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | A network of Bluetooth devices. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | A technology that allows a network administrator to configure the switch to redirect the traffic that occurs on some or all ports to a designated monitoring port on the switch. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | A monitoring device or a computer with monitoring software that captures each packet to decode and analyze its contents. Also called a sniffer. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | An attack that makes a copy of an intecepted transmission before sending it to the recipient. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | An unauthorized point that by-passes all of the network security and opens the network and users to direct attacks. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | The process of a wireless device looking for beacon frames. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | A group of piconets in which connections exist between different piconets. |  
          | 
        
        
         | 
        
        
        Term 
        
        | Simple Network Management Protocol (SNMP) |  
          | 
        
        
        Definition 
        
        | A popular protocol used to manage network equipment. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | The device in a Bluetooth network that takes commands from the master device. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | The amount of time that a wireless device must wait after the medium is clear. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | A monitoring device or a computer with monitoring software that captures each packet to decode and analyze its contents. Also called a protocol analyzer. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | Pretending to be someone or something else by presenting false information. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | A human-readable computer name composed of letters, numbers, and special symbols. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | An attack that creates fictitious Transimssion Control Protocol packets to take advantage of a weakness in the protocol. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | The process of passive wireless discovery, or of finding a WLAN signal and recording information about it. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | Passwords that compromise security. |  
          | 
        
        
         | 
        
        
        Term 
        
        | wireless location mapping |  
          | 
        
        
        Definition 
        
        | The process of passive wireless discovery, or of finding a WLAN signal and recording information about it. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | The exchange of information between Domain Name System servers. |  
          | 
        
        
         |