Process of enabling security on a wireless local area network.
What is wireless network security?
A wireless local area network (WLAN), or Wi-Fi, is a wireless networking technology that uses radio waves rather than copper-core or fiber-optic cable and operates on the unlicensed spectrum as defined by IEEE ______ standard.
What is 802.11?
Wireless networking standard that provides more security than other standard by employing port-based security. Specifically, it enables port-based authentication after a user’s identity has been confirmed.
What is IEEE 802.1X standard?
Coverage provided by the base station of a cellular network is contained within a specified geographic area.
What is cell?
Using remote servers on the Internet to host, access, and store data rather than using a personal computer or local server using a pay-per-use service model.
What is cloud computing?
Wireless networking technology that uses radio waves rather than a copper-core or fiber-optic cable.
What is Wi-Fi /wireless local area network (WLAN)?
Protocols that have been discouraged from usage pose a significant risk to any network to which they connect. For example, WEP
What is deprecated protocols?
Open standard authentication protocol created jointly by Cisco, Microsoft, and RSA to protect EAP communications, and uses a lightweight tunneling protocol to enable secure authentication.
What is Protected EAP (PEAP)?
Terms such as 2G, 3G, 4G, 5G and LTE are often used when talking about cellular networks.
What is Generations?
Cloud computing service in which a vendor provides the customer with virtualized infrastructure over the Internet.
What is Infrastructure as a Service (IaaS)?
Wireless connection that enables mobile devices to share data via a short-range, ad-hoc communication sessions between devices.
What is Bluetooth?
Network security setting and standard for wireless networks released in 2007 as a simple, fast method of securing wireless communication. Uses PIN, Push, and NFC methods to connect devices.
What is Wi-Fi Protected Setup (WPS)?
Authentication protocol created by Cisco to replace a previously unsecure version of EAP.
What is EAP-Flexible Authentication via Secure Tunneling (FAST)?
Integrated circuit that stores a cellular device’s international mobile subscriber identity (IMSI) number and related key.
What is subscriber identity module (SIM) card?
Measurement expressed as a percentage of time that the cloud storage system is working and available.
What is Uptime?
Wireless technology that uses electromagnetic fields to automatically identify objects and track tags or smart labels that are attached to the objects.
What is radio-frequency identification (RFID)?
Wireless security standard that replaced WEP and offers more security in terms of keys and user authentication.
What is Wi-Fi Protected Access (WPA)?
The protocol that provides certificate-based authentication.
What is EAP over Transport Layer Security (EAP-TLS)?
Communication methods that enable a receiver to communicate and receive information from global navigation satellite systems (GNSS).
What is Global Positioning Systems (GPS)?
Software application development method made up of reusable components used in a cloud-native application.
What is microservice / microservice architecture?
Telecommunication network standard based on IEEE’s 802.15.4 personal area network standard.
What is ZigBee?
Newest generation of Wi-Fi security and provides advanced security protocols to the communication of wireless transmissions.
What is Wi-Fi Protected Access III (WPA3)?
Identity and access authentication server that functions on both wired and wireless networks.
What is a Remote Authentication Dial-In User Service (RADIUS) server?
Range of frequencies by which radio waves operate and communicate.
What is radio frequency (RF) spectrum?
Cloud service that provides on-demand software and hosting on an as-used basis.
What is serverless architecture / serverless computing or function as a service (FaaS)?