Glossary- W Flashcards Preview

CISA > Glossary- W > Flashcards

Flashcards in Glossary- W Deck (23):


A review of some or all disaster recovery and business continuity plans, procedures, and other documentation. A walkthrough is performed by an entire group of individuals in a live discussion.



A structure that prevents or deters passage by unauthorized personnel.


WAN switch

A general term encompassing several types of wide area network switch- ing devices, including ATM switches, Frame Relay switches, MPLS switches, and ISDN switches.


war chalking

The practice of marking buildings (using chalk) with symbols to indi- cate the presence of a Wi-Fi access point, including some basic facts about it. See also war driving, Wi-Fi.


war dialing

An attack designed to discover unprotected remote access modems by dialing phone numbers sequentially and recording those with modems.


war driving

An attack on a wireless network where attackers intercept and record in- formation about Wi-Fi access points.


warm site

An alternate processing center where recovery systems are present, but at a lower state of readiness than recovery systems at a hot site. For example, while the same version of the operating system may be running on the warm site system, it may be a few patch levels behind primary systems.


waterfall model

A software development life cycle process where activities are se- quential and are executed one time in a software project. See also software development life cycle (SDLC).


web-based application

An application design where the database and all business logic are stored on central servers, and where user workstations use only web browsers to access the application.


web-based application development

A software development effort where the ap- plication’s user interface is based on the HTTP (Hypertext Transport Protocol) and HTML (Hypertext Markup Language) standards.


web proxy filter

A central program or device that monitors and, optionally, filters web communications. A web proxy filter is often used to control the sites (or categories of sites) that users are permitted to access from the workplace. Some web proxy filters can also protect an organization from malware.


web server

A server that runs specialized software that makes static and dynamic HTML pages available to users.


web services

A means for system-to-system communications using the HTTP protocol.


Web Services Description Language (WSDL)

An XML-based language that is used to
describe web services. See also web services.


wet pipe

A fire sprinkler system where all sprinkler pipes are filled with water. Each sprinkler head is equipped with a fuse—a heat-sensitive glass bulb—that breaks upon reaching a preset temperature. When this occurs, water is discharged from just that sprinkler head, which is presumably located near a fire. See also fire sprinkler system.



The common name for a wireless LAN protocol. See also 802.11.


Wi-Fi protected access (WPA)

An encryption standard for 802.11 wireless networks.
The final version of WPA is known as WPA-2. See also 802.11.


wide area network (WAN)

A network whose size ranges from regional to interna- tional. This term is also used to describe a single point-to-point connection between two distant locations (a “WAN connection”).


wideband code division multiple access (W-CDMA)

An airlink standard for wireless communications between mobile devices and base stations.


wired equivalency protocol (WEP)

An encryption standard for 802.11 wireless net- works. WEP has been compromised and should be replaced with WPA-2. See also 802.11, Wi-Fi Protected Access (WPA).


wireless USB (WUSB)

A short-range, high-bandwidth standard wireless communica- tions protocol used to connect computer peripherals.


work breakdown structure (WBS)

A logical representation of the high-level and de- tailed tasks that must be performed to complete a project.



A type of malware containing stand-alone programs capable of human-assisted and automatic propagation.