An account installed by default on an OS or device with a default set of credentials.
The act of exploiting a bug in software or firmware to gain access to resources that are protected from users.`
Built into programs to bypass authentication or other security protocols.
When a signal from one copper wire creates an undesired effect on another wire; the signal "bleeds" over from one wire to another.
The electomagnetic field generated by a network cable or networked device, which can be used to eavesdrop on conversations or steal data.
A device used to add computer to a 10BASE5 network. It pierces the copper conductor of a coaxial cable and can also be used for malicious purposes.
Tapping into a network cable in an attempt to eavesdrop on a conversation or steal data.
The refraction of light as in a rainbow. If light is refracted in such a manner on fiber optic cables, the signal cannot be read by the receiver.
Electromagnetic Interference (EMI)
A disturbance that can affect elecrtial circuits, devices, and cables due to electromagnetic conduction or radiation.
Radio Frequency Interference (RFI)
Interference that can come from AM/FM transmissions and cell towers.
Refers to the ivestigations of conducted emissions from electrical and mechanical devices, which could be compromising to an organization.
An enclosure formed by conducting material or by mesh of such material; it blocks out external static electic fields and can stop emanations from cell phones and other devices within the cage from leaking out.
Butt Set (or lineman's handset)
A device that loks similar to a phone but has alligator clips that can connect to the various terminals used by phone equipment, enabling a person to listen in to a conversation.
Service Set Identifier (SSID)
The name of a wireless access point (or network) to which network clients will connect.
Wired Equivalent Privacy (WEP)
A deprecated wireless network security standard, less secure than WPA.
Wi-Fi Protected Access (WPA)
A security protocol created by the Wi-Fi Alliance to secure wireless computer networks, more secure than WEP.
Advanced Encryption Standard (AES)
An encryption standard used with WPA and WPA 2. The successor to DES/3DES and is another symmetic key encryption standard composed of three different block ciphers: AES-128, AES-192, and AES-256.
Temporal Key Integrity Protocol (TKIP)
An algorithm used to secure wireless networks; replacement for WEP.
A methos used to filter out which computers can access the wireless network based on a list of authorized MAC addresses.
Each client connected to the AP will not be able to communicate with each other, but they can still access the Internet.
The act of searching for wireless networks by driving around with a strong wireless antenna.
A type of related-key attack, which is when an attacker observes the operation of a cipher using several different keys, and finding a mathematical relationship between them, allowing them to decipher data.
The sending of unsolicited messages to Bluetooth enabled devices.
The unauthorized access to information from a Bluetooth enabled device.