7SIGNAL
Wi-Fi Optimization Glossary
There’s a lot of jargon in the Wi-Fi world. The 7SIGNAL Wi-Fi Optimization Glossary helps you navigate the industry.
Whether you want to learn about Access Control Lists or Zero-Day Vulnerabilities, think of this as your go-to resource for all things Wi-Fi. Learn about basic concepts, key network elements, and other relevant topics, so you can build a Wi-Fi network that works for your business.
A
A list of permissions attached to an object that specifies which users or system processes can access the object and what operations they can perform.
A device that allows wireless devices to connect to a wired network using Wi-Fi.
A Microsoft service for Windows domain networks used for user and resource management.
A network where devices communicate directly with each other without a central router or access point.
Advanced Encryption Standard (AES)
A symmetric encryption algorithm widely used across the globe to secure data.
Antenna Diversity
A technique used to improve the quality and reliability of a wireless link by using multiple antennas.
Application Layer
The top layer of the OSI model, where network services and applications communicate.
Asymmetric Encryption
An encryption method that uses a pair of keys—a public key and a private key—to encrypt and decrypt data.
The process of verifying the identity of a user or device.
B
Backdoor
A method of bypassing normal authentication procedures to access a system.
Backhaul
The intermediate links between the core network and the small subnetworks at the edge of the network.
The maximum rate of data transfer across a given path, typically measured in bits per second (bps).
Battleshiping
A technique used by attackers to systematically scan a network for open ports or services.
A frame sent by an access point to signal its presence and provide information about the network.
Beamforming
A technology that focuses a wireless signal towards a specific receiving device.
Biometrics
The use of physical characteristics, such as fingerprints or facial recognition, for authentication.
Black Hat Hacker
A hacker who uses their skills for malicious purposes, such as stealing data or causing damage.
A wireless personal area network technology designed for short-range communication with low power consumption.
A wireless technology standard for exchanging data over short distances using short-wavelength UHF radio waves.
Botnet
A network of infected computers controlled by a single attacker, often used to perform DDoS attacks.
Brute Force Attack
An attack method that uses trial and error to guess login information, encryption keys, or find a hidden web page.
BSSID (Basic Service Set Identifier)
The unique identifier for a specific access point in a Wi-Fi network.
A policy allowing employees to bring personal devices to work and connect them to the company network.
C
A specific frequency range used by a Wi-Fi network to transmit data.
A device that connects to a Wi-Fi network, such as a laptop, smartphone, or IoT device.
The area within which a wireless network can reliably communicate with devices.
Cross-Site Scripting (XSS)
A security vulnerability in web applications that allows attackers to inject malicious scripts into web pages viewed by other users.
Cryptojacking
The unauthorized use of someone's computer to mine cryptocurrency.
CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance)
A network protocol that listens to a network in order to avoid collisions by waiting for a clear signal before transmitting.
CSMA/CD (Carrier Sense Multiple Access with Collision Detection)
A network protocol that detects collisions and takes action to mitigate them.
D
DAZ (Data Access Zone)
A secured area within a network where data is made available for access or transfer while ensuring it remains protected from unauthorized access.
Denial of Service (DoS)
An attack that aims to make a network or service unavailable to its intended users by overwhelming it with a flood of illegitimate requests.
DHCP (Dynamic Host Configuration Protocol)
A protocol used to automatically assign IP addresses to devices on a network.
Distributed Denial of Service (DDoS)
A variant of DoS attacks where multiple compromised systems are used to target a single system.
A system that translates domain names into IP addresses.
A device that operates on both the 2.4 GHz and 5 GHz frequency bands.
E
Edge Computing
A distributed computing paradigm that brings computation and data storage closer to the location where it is needed.
EIRP (Equivalent Isotropically Radiated Power)
The total power that would be radiated by an isotropic antenna (which evenly distributes power in all directions) that has the same power density at a particular point as the actual antenna.
The process of encoding data transmitted over a network to protect it from unauthorized access.
A device or node that connects to a network, such as a computer, mobile device, or IoT device.
A family of networking technologies used for local area networks (LANs).
Exploit Kit
A toolkit used by cybercriminals to exploit security vulnerabilities in software applications.
F
Firewall
A network security device that monitors and filters incoming and outgoing network traffic.
Forensics
The use of investigative techniques to gather and analyze data from computer systems to determine how a security breach occurred.
Frequency
The rate at which a wireless signal oscillates, typically measured in Hertz (Hz).
G
Gateway
A device that connects different networks and facilitates communication between them.
Gigabit Ethernet
A version of Ethernet technology that provides data transfer rates of 1 gigabit per second (Gbps).
Gray Hat Hacker
A hacker who may violate laws or ethical standards but does not have malicious intent.
GSM (Global System for Mobile Communications)
A standard developed to describe protocols for second generation (2G) digital cellular networks.
H
HTTP (Hypertext Transfer Protocol)
The protocol used for transmitting web pages over the internet.
HTTPS (Hypertext Transfer Protocol Secure)
An extension of HTTP that uses encryption to secure data transmitted over the internet.
I
Incident Response
The process of detecting, responding to, and recovering from a cyber attack or data breach.
Insider Threat
A threat to an organization's security that comes from individuals within the organization, such as employees or contractors.
The disruption of a wireless signal by other signals or physical obstacles.
Intrusion Detection System (IDS)
A system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered.
Intrusion Prevention System (IPS)
A system that monitors network traffic for suspicious activity and takes action to prevent it.
A unique string of numbers that identifies each device on a network.
IPSec (Internet Protocol Security)
A suite of protocols that secure Internet Protocol (IP) communications by authenticating and encrypting each IP packet.
IPv4 (Internet Protocol version 4)
The fourth version of the Internet Protocol, which uses 32-bit addresses.
IPv6 (Internet Protocol version 6)
The sixth version of the Internet Protocol, which uses 128-bit addresses.
J
K
Keylogger
A type of surveillance software that records keystrokes made by a user to capture sensitive information like passwords and credit card numbers.
L
A network that connects devices in a limited area, such as a building or campus.
The time it takes for a data packet to travel from the sender to the receiver.
The process of distributing network traffic across multiple servers to ensure no single server becomes overwhelmed.
A standard for wireless broadband communication for mobile devices and data terminals, commonly referred to as 4G.
M
MAC Address (Media Access Control Address)
A unique identifier assigned to network interfaces for communications on the physical network.
Malware
An attack where the attacker secretly intercepts and possibly alters the communication between two parties.Malicious software designed to harm, exploit, or otherwise compromise the data or functionality of a computer system.
Man-in-the-Middle (MitM) Attack
An attack where the attacker secretly intercepts and possibly alters the communication between two parties.
A network topology where multiple nodes work together to provide seamless coverage.
MIMO (Multiple Input Multiple Output)
A wireless technology that uses multiple antennas to send and receive more than one data signal simultaneously.
MU-MIMO (Multi-User Multiple Input Multiple Output)
A technology that allows multiple devices to receive data simultaneously from a Wi-Fi access point.
N
Network Address Translation (NAT)
A method of remapping one IP address space into another by modifying network address information in the IP header of packets.
A state where the network is overloaded with too much traffic, leading to slow performance and packet loss.
Network Interface Card (NIC)
A hardware component that connects a computer to a network.
O
P
A unit of data transmitted over a network.
The failure of one or more transmitted data packets to arrive at their destination.
Patch Management
The process of managing software updates to fix vulnerabilities and improve performance.
Penetration Testing
A simulated cyber attack against a computer system to identify vulnerabilities.
Phishing
A method of fraudulently obtaining sensitive information by disguising as a trustworthy entity in electronic communications.
A network utility that tests the reachability of a host on an IP network and measures the round-trip time for messages sent.
Port
A virtual point where network connections start and end, used by protocols to establish connections.
Public Key Infrastructure (PKI)
A framework for managing digital certificates and public-key encryption.
Q
QoS (Quality of Service)
A set of technologies that manage network traffic to reduce packet loss, latency, and jitter.
R
Ransomware
A type of malware that encrypts a user's files and demands a ransom to restore access.
Red Teaming
A security practice where a group of ethical hackers simulate real-world attacks to test an organization's defenses.
Rootkit
A set of software tools that enable unauthorized access to a computer system without being detected.
A device that forwards data packets between computer networks.
Routing Protocol
A protocol used by routers to determine the best path for forwarding packets.
S
SIM (Subscriber Identity Module)
A small card used in mobile devices to identify and authenticate subscribers on mobile networks.
Social Engineering
A tactic used by attackers to manipulate individuals into divulging confidential or personal information.
Spear Phishing
A targeted phishing attack directed at a specific individual or organization.
Spyware
Software that secretly monitors and collects information about users' activities on their devices.
SQL Injection
A code injection technique that exploits a security vulnerability in an application's software by injecting malicious SQL code.
The name of a Wi-Fi network that is broadcast by an access point.
Switch
A network device that connects devices together on a local area network (LAN).
T
TCP/IP (Transmission Control Protocol/Internet Protocol)
A suite of communication protocols used to interconnect network devices on the internet.
Threat Intelligence
Information about potential or current threats that can help organizations protect themselves from cyber attacks.
Throughput
The actual rate of successful data transmission over a network.
TLS (Transport Layer Security)
A cryptographic protocol designed to provide communications security over a computer network.
Trojan Horse
A type of malware disguised as legitimate software, which, when executed, gives unauthorized access to the user's system.
Two-Factor Authentication (2FA)
A security process in which the user provides two different authentication factors to verify their identity.
U
UDP (User Datagram Protocol)
A communication protocol that is used for time-sensitive transmissions such as video playback or DNS lookups.
V
VLAN (Virtual Local Area Network)
A logical subdivision of a LAN that groups devices together regardless of their physical location.
VPN (Virtual Private Network)
A service that allows you to connect to the internet securely and privately.
W
WAN (Wide Area Network)
A network that extends over a large geographical area.
WEP (Wired Equivalent Privacy)
An outdated security protocol for wireless networks that has been replaced by WPA and WPA2.
White Hat Hacker
An ethical hacker who uses their skills to help organizations improve their security.
A generation of Wi-Fi technology that provides higher data rates and increased capacity compared to previous versions.
The latest generation of Wi-Fi technology, offering higher data rates and improved performance in dense environments.
WPA2/WPA3 (Wi-Fi Protected Access)
Security protocols that provide data protection for Wi-Fi networks.
X
Y
Z
Zero Trust
A security model that requires strict identity verification for every person and device trying to access resources on a network.
Zero-Day Exploit
A cyber attack that occurs on the same day a vulnerability is discovered and before a fix is implemented.
Zero-Day Vulnerability
A software vulnerability that is unknown to the vendor and for which no patch has been released.
Build a Wi-Fi Network That Works for Your Business
7SIGNAL helps businesses that view wireless networks as strategic assets, contributing to the operational efficiency and competitiveness of their organizations.
Access products and services for managing, optimizing, and maintaining Wi-Fi network performance in the most critical and demanding environments.