war dialing - An attack in which a long list of phone numbers is inserted into a war-dialing program in the hope of finding a modem that can be exploited to gain unauthorized access.
waterfall developmet methodology - A development model in which each phase contains a list of activities that must be performed and documented before the next phase begins.
well-known ports - Ports 0
white-box testing - A design that allows one to peek inside the
whitelist - A set of known good resources such as IP addresses, domain names, or applications.
Wi-Fi - (Wireless Fidelity) -Primarily associated with computer networking, Wi-Fi uses the IEEE 802.11x specification to create a wireless local-area network either public or private.
wireless fidelity - Primarily associated with computer networking, Wi-Fi uses the IEEE 802.11x specification to create a wireless local-area network either public or private.
work factor - The estimated time and effort required for an attacker to overcome a security control.
worldwide interoperability for microwave access - A family of wireless broadband communication standards based on the IEEE 802.16 set of standards, which provide multiple physical layer (PHY) and Media Access Control (MAC) options.
worm - An independent program that can reproduce by copying itself from one system to another. It may damage data directly or degrade system performance by tying up resources.
write - An operation that results in the flow of information from a subject to an object.