Appendix A: Glossary

WEP Wired Equivalent Privacy. A protocol that is part of the IEEE 802.11 suite of protocols for wireless LANs. Its purpose is to provide security equivalent to an unsecured wired LAN. It has been superseded by WPA and IEEE 802.11i. For more information, see IEEE 802.11 at http://standards.ieee.org/getieee802/

802.11.html.

Windows The desktop and server operating system developed by Microsoft. The versions of Windows that are supported by the NAC 800 are Windows 98, Windows 2000, Windows XP Professional and Home, Windows Server 2000 and 2003, and Windows NT.

Wireless Edge A ProCurve product that is used to manage wireless LANs. The module, which Services Module is installed in a switch, controls multiple RPs (coordinated APs).

WMI Windows Management Instrumentation. A set of extensions to the Windows Driver Model that is Microsoft’s implementation of the Web-Based Enterprise Management and Common Information Model standards.

worm A computer worm is a self-replicating computer program similar to a computer virus. While a virus attaches itself to and becomes part of another executable program, a worm is self-contained and does not need to be part of another program to propagate. Worms often exploit file transmission capabilities found on many computers, using networks to send copies of themselves to other systems without any intervention. In general, worms harm the network and consume bandwidth, whereas viruses infect or corrupt files on a targeted computer. Viruses generally do not affect network performance, because their malicious activities are mostly confined within the target computer itself.

WPA Wi-Fi Protected Access. A standard created by IEEE and the Wi-Fi Alliance to address the security weaknesses in WEP. For more information, see the Wi-Fi Alliance white paper at http://www.wi-fi.org/white_papers/whitepaper-

042903-wpa.

WPA-PSKWPA using a Preshared Key. PSK refers to a key that is shared between two stations before it needs to be used, such as over a secured channel or non- electronically (the end-user is told the correct key).

A-24