Wi-Fi is the technology used for wireless networking. If your computer has a wireless card, it is most likely Wi-Fi compatible. The wireless card transmits to a wireless router, which is also based on the Wi-Fi standard. Wireless routers are often connected to a network, cable modem, or DSL modem, which provides Internet access to anyone connected to the wireless network.
Bluetooth is the technology often used for wireless keyboards and mice, wireless printing, and wireless cell phone headsets. In order to use a device such as a Bluetooth keyboard or mouse, your computer must be Bluetooth-enabled or have a Bluetooth adapter installed.
-----------------------------------------------------------
Wi-Fi (short for Wireless Fidelity) is the brand name licensed bythe Wi-Fi Alliance and governed by Institute of Electrical and Electronics Engineers (IEEE) 802.11 standards for a technology that allows wireless communications between devices enabled with Wi-Fi technology and wireless local area networks (WLAN).
Term | Definition |
802.11 | The Institute of Electrical and Electronics Engineers (IEEE) 802.11 standard forms the basis for Wi-Fi technology. Also see the differences between 802.11a, 802.11b, 802.11g and 802.11n. |
Access Point (AP) | Hardware or software that acts as a communication hub for wireless devices connected to a wireless LAN. Can also extend security and the physical range of service for WLAN devices. An Access Point may also be referred to as a "wireless router," "wireless gateway," and "base station. |
Advanced Encryption Standard Counter Mode CBC - MAC Protocol (AES-CCMP) | Advanced Encryption Standard Counter Mode CBC - MAC Protocol (AES-CCMP) is a security protocol that uses the AES block cipher, but restricts the key length to 128 bits. AES-CCMP incorporates two cryptographic techniques (counter mode and CBC-MAC) and adapts them to Ethernet frames to provide a robust security protocol between the mobile client and the Wi-Fi access point. |
Captive portal | A captive portal is a security tool that blocks network traffic and redirects web browsers to an authentication web page. Once the authentication process is complete, the captive portal grants access to the network and, if applicable, to the Internet. Captive portals often provide security for hotspots, but they may also provide security for wired networks. |
Certificate-based authentication | Certificate-based authentication is a network security method that uses certificates issued by a certificate authority to authenticate network connections. The certificate authority issues certificates to both the device and the authentication server, both of which must trust the certificate authority for the certificates to be valid. |
Extensible Authentication Protocol (EAP) | Extensible Authentication Protocol (EAP) is an authentication framework used for both wireless local area networks (WLAN) and local area networks (LAN). |
EAP-FAST | Extensible Authentication Protocol Flexible Authentication via Secure Tunneling (EAP-FAST) is a security protocol similar to EAP-TLS, that uses a TLS encrypted tunnel to protect weaker inner authentication methods, possibly based on passwords. |
EAP-SIM | Extensible Authentication Protocol Method for Global System for Mobile Communication Subscriber Identity Module (EAP-SIM) uses the Subscriber Identity Module (SIM) card for network authentication. |
EAP-TLS | Extensible Authentication Protocol Transport Layer Security (EAP-TLS) uses a Public Key Infrastructure (PKI) to enable authentication with an authentication server. EAP-TLS establishes a TLS encrypted tunnel to facilitate certificate-based authentication. |
EAP-TTLS | Extensible Authentication Protocol Tunneled Transport Layer Security (EAP-TTLS) extends TLS by authenticating only the server, using a Public Key Infrastructure (PKI) certificate, to create the TLS encrypted tunnel for additional authentication and communication. |
Hotspot | A hotspot is an area with coverage from one or more Wi-Fi networks. Although any Wi-Fi network may have an associated hotspot, access to that Wi-Fi network may require registration, a usage fee, or valid security credentials. |
Lightweight Extensible Authentication Protocol (LEAP) | Cisco Systems, Inc. developed Lightweight Extensible Authentication Protocol (LEAP) in response to the weaknesses identified in Wired Equivalent Privacy (WEP). LEAP dynamically generates WEP keys and updates Wi-Fi network devices. |
Network Address Translation (NAT) | Network Address Translation (NAT) is a process where the devices on a network have a private Internet Protocol (IP) address within the network but share a single public IP address when communicating outside of that network. NAT helps alleviate the public IP address shortage with the added security benefit of only allowing traffic initiated from inside the network and blocking unsolicited traffic, possibly malicious in nature, initiated outside of the network. NAT usually occurs at the router or firewall level. |
Open Authentication (open network) | A wireless network that does not have a security method. |
Protected Extensible Authentication Protocol (PEAP) | Protected Extensible Authentication Protocol (PEAP) is an open standard developed jointly by Microsoft Corporation, RSA Security, and Cisco Systems, Inc. PEAP uses a Transport Security Layer (TLS) encrypted tunnel to communicate authentication credentials to the authentication server. |
Pre-Shared Key (PSK) | The Pre-Shared Key (PSK) method uses a shared pass phrase that is up to 256 bits in length to allow the wireless access point and the device enabled with Wi-Fi technology to mutually derive link layer encryption keys. The PSK method uses algorithms to secure Wi-Fi network communications, but it relies on a single, shared pass phrase. All wireless access points and device enabled with Wi-Fi technology must know the pass phrase. |
Service Set Identifier (SSID) | The Service Set Identifier (SSID) is the network name that identifies a particular Wi-Fi access point or router. |
Temporal Key Integrity Protocol (TKIP) | Temporal Key Integrity Protocol (TKIP) is a security protocol for WPA. TKIP provides per-packet key mixing, a message integrity check and a re-keying mechanism. |
Token-based credentials | Token-based credentials are network security credentials that use a token formed by combining a unique identifier, called a seed token, and another variable. Successful network authentication requires a valid token. There are two different types of token-based credentials: hardware tokens and software tokens. Hardware tokens are tokens generated by a physical device separate from the network client device and software tokens are generated by software residing on the network client device. |
Unlicensed Mobile Access (UMA) and Generic Gccess Network (GAN) | Unlicensed Mobile Access (UMA) and generic access network (GAN) are terms describing the system that allows a device enabled with Wi-Fi technology to access the mobile network through a wireless local area network (WLAN). The terms UMA and GAN are interchangeable. Within the UMA/GAN system, a device enabled with Wi-Fi technology connects to a WLAN and establishes a secure Internet Protocol (IP) connection to a generic access network controller (GANC). |
Wired Equivalent Privacy (WEP) | Wired Equivalent Privacy (WEP) encryption uses matching encryption keys at both the wireless access point and the device enabled with Wi-Fi technology to secure wireless communication. This key can be 40 bits (for 64-bit WEP) or 104 bits (for 128-bit WEP) in length. |
Wi-Fi Protected Access (WPA) | Wi-Fi Protected Access (WPA) is a software upgradeable security solution for Wi-Fi networking that addresses the vulnerabilities of Wired Equivalent Privacy (WEP) encryption. WPA uses Temporal Key Integrity Protocol (TKIP) with the following variations:
|
Wi-Fi Protected Access 2 (WPA2) | Wi-Fi Protected Access 2 (WPA2) improves on WPA by introducing encryption algorithms considered fully secure and implementing all of the mandatory components of IEEE 802.11i. WPA2 uses Advanced Encryption Standard Counter Mode with Cipher Block Chaining Message Authentication Code (AES-CCMP) encryption with the following variations:
|
No comments:
Post a Comment