W - Definitions

  • W

    walled garden

    On the internet, a walled garden is an environment that controls the user's access to network-based content and services.

  • WebAuthn API

    The Web Authentication API (WebAuthn API) is a credential management application program interface (API) that lets web applications authenticate users without storing their passwords on servers.

  • What is a watering hole attack?

    A watering hole attack is a security exploit in which the attacker seeks to compromise a specific group of end users by infecting websites that members of the group are known to visit.

  • What is a web application firewall (WAF)? WAF explained

    A web application firewall (WAF) is a firewall that is meant to protect web applications against common web-based threats.

  • What is a whaling attack (whaling phishing)?

    A whaling attack, also known as 'whaling phishing' or a 'whaling phishing attack,' is a specific type of phishing attack that targets high-profile employees, such as the chief executive officer (CEO) or chief financial officer, to steal sensitive information from a company.

  • What is the WannaCry ransomware attack?

    WannaCry ransomware is a cyberattack that spread by exploiting vulnerabilities in earlier and unpatched versions of the Windows operating system (OS).

  • What is WPA3 (Wi-Fi Protected Access 3)?

    WPA3, also known as Wi-Fi Protected Access 3, is the third iteration of a security certification standard developed by the Wi-Fi Alliance. WPA3 is the latest updated implementation of WPA2, which has been in use since 2004.

  • white hat hacker

    A white hat hacker -- or ethical hacker -- is an individual who uses hacking skills to identify security vulnerabilities in hardware, software or networks.

  • Wi-Fi Pineapple

    A Wi-Fi Pineapple is a wireless auditing platform from Hak5 that allows network security administrators to conduct penetration tests.

  • Windows Defender Exploit Guard

    Microsoft Windows Defender Exploit Guard is antimalware software that provides intrusion protection for Windows 10 OS users.

  • Wired Equivalent Privacy (WEP)

    Wired Equivalent Privacy (WEP) is a security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.11b.

  • WLAN Authentication and Privacy Infrastructure (WAPI)

    WLAN Authentication and Privacy Infrastructure (WAPI) is a wireless local area network security standard officially supported by the Chinese government.