43 terms
Wireless security terms
Wireless security terms explain the tools and threats behind Wi-Fi networks, mobile signals, and wireless devices. Understanding this vocabulary helps you protect your connections — at home, work, or on the go.
Broadband wireless access
Broadband wireless access (BWA) is a way to connect to high-speed internet without using traditional cables or wires.
iBeacon
iBeacon refers to a small Bluetooth Low Energy (BLE) device introduced by Apple in 2013.
Long-Term Evolution Advanced
Long-Term Evolution Advanced (LTE Advanced) refers to an upgraded version of LTE.
Spectrum Efficiency
Spectrum efficiency is the optimal use of the radio frequency (RF) spectrum.
WPA key
A WPA key, or Wi-Fi Protected Access key, or simply WPA password, is a security measure used to protect wireless networks.
WPA-Enterprise
WPA-Enterprise is a security protocol for Wi-Fi networks.
WMN network
A WMN network is a wireless network where data is transmitted using mesh networking techniques.
Wireless wide area network
Wireless wide area network refers to a type of wireless network that covers large areas, often spanning several kilometers to even thousands of kilometers.
Wireless network security
Wireless network security refers to the protection of wireless networks, devices, and data from unauthorized access, theft, or damage.
Wireless local area network
WPAN is a wireless local area network (WLAN) refers to a network that allows devices to connect and communicate wirelessly within a limited area, such as a home, school, or office building, using radio waves.
Wireless intrusion prevention system
A wireless intrusion prevention system (WIPS) is a security system designed to protect wireless networks from unauthorized access and malicious activities.
Wireless fidelity
Wireless fidelity is a part of the marketing slogan for Wi-Fi used by WECA (the precursor to the Wi-Fi Alliance) to promote the technology to home users.
Wireless application service provider
Wireless application service providers (WASPs) are companies that help businesses offer mobile services (e.g., texting, payments, and content delivery) to users.
Wired equivalent privacy
Wired equivalent privacy (WEP) is a security protocol used to protect data transmitted over wireless networks.
Wired equivalent privacy 2
Wired equivalent privacy 2 (WEP2) is the second version of an outdated security protocol used for protecting data transmitted over wireless networks, WEP.
Wideband Code Division Multiple Access
Wideband Code Division Multiple Access is a third-generation (3G) mobile communication standard.
Wi-Fi protected setup
Wi-Fi Protected Setup, or WPS, offers a quicker way to link devices to a wireless network.
Wi-Fi protected access pre-shared key
Wi-Fi protected access pre-shared key (WPA-PSK) refers to a mode of Wi-Fi security which is commonly used in home networks and small businesses without enterprise-level equipment.
Wi-Fi Direct
Wi-Fi Direct refers to a wireless technology that enables two devices to communicate with each other directly over Wi-Fi.
War driving
War driving refers to the act of searching the neighborhoods for Wi-Fi wireless networks, often driving around in a vehicle equipped with a Wi-Fi-enabled device, and mapping these networks.
Voice over wireless local area network
Voice over wireless local area network (VoWLAN) is a technology that allows you to make phone calls using Wi-Fi instead of a traditional phone line.
Transmitter
A transmitter is an electronic telecommunications device used for transmitting data.
Tethering
Tethering is the practice of connecting two devices (smartphones, laptops, desktops, and/or tablets) together so that one device can use the mobile internet of the other one when Wi-Fi is not available.
Temporal key integrity protocol
Temporal key integrity protocol (also known as TKIP) is an encryption method for wireless local area networks.
SSID
A service set identifier, or SSID, is the name of your Wi-Fi network.
Spatial multiplexing
Spatial multiplexing is a model of transmission, usually used in multiple input multiple output (MIMO) systems, where multiple independent data streams are transmitted over multiple antennas to increase the data rate.
Scatternet
A scatternet is an ad hoc network formed between two or more piconets (independent Bluetooth networks made up of one parent device and up to seven active child devices) in proximity.
Rogue access point
A rogue access point is a wireless access point that was set up without the network’s administrator’s or owner’s consent.
RF jamming
RF jamming, also known as radio frequency jamming, is the deliberate interference or disruption of wireless communication signals using radio frequency signals of similar frequencies.
MiFi
MiFi is a brand name for a type of wireless router that can act like a mobile Wi-Fi hotspot.
Long-term evolution
Long-term evolution (LTE) is a standard that is used to deliver data faster to mobile devices and data terminals around the world.
Jamming
Jamming refers to often illegal activity in which someone is interfering with the radio signals of a network or system.
Jammer
A jammer is a mobile communications device that transmits on the same frequency band as a cellphone.
Hotspot
Hotspot refers to a location or device that provides wireless internet access to other devices, often using Wi-Fi.
Geofencing
Geofencing is a technology that creates virtual boundaries in real-world areas using GPS, RFID, Wi-Fi, or cellular data.
Fixed wireless access
Fixed wireless access (FWA) is a method to provide internet access to homes or businesses using wireless technologies rather than traditional wired solutions like fiber or DSL.
Extended service set
An extended service set is a group of interconnected wireless access points and stations that form a single logical network.
Evolution Data Only
Evolution Data Only (also known as Evolution-Data Optimized) is a telecommunications standard for wireless transmission using radio signals.
Discoverable mode
Discoverable mode is a state in which a Bluetooth device becomes visible to other Bluetooth devices — it broadcasts its presence so that other devices within range can detect it.
Bluetooth
Bluetooth is a low-power wireless technology that uses ultra-high frequency (UHF) radio waves for secure data exchange over short distances.
The importance of wireless security terminology
Wireless networks make life more convenient — but they also create more opportunities for attackers. Learning wireless security terms can help you spot vulnerabilities and stay one step ahead.
Secure your home network
Terms like “WPA3” or “router firewall” help you set up smarter protections for your personal Wi-Fi.
Understand the risks of public Wi-Fi
Knowing what a man-in-the-middle attack is helps you avoid unsafe networks and protect your data in public.
Protect wireless devices
From keyboards to doorbells, many gadgets connect wirelessly. Understanding the terminology helps you keep them secure.
Online security starts with a click.
Stay safe with the world’s leading VPN
Explore related articles
Explore related glossary categories
Can’t find an answer to your question?
Ask the questions that matter to you — and get answers from our cybersecurity experts.