Skip to main content
. 2 3 A B C D E F G H I J K L M N O P Q R S T U V W X Z

W

WAN

Wide Area Network

WannaCry

WanaCrypt0r, WeCry, Wcry, WanaCrypt, WannaCrypt, Wana Decrypt0r 2.0, WanaCrypt0r 2.0, and Wanna Decryptor.

WAP

Wireless Access Point

Watering hole

Setting up a fake website (or compromising a real one) in order to infect and exploit visiting users.

WCM

Web Content Management

Wear levelling

A technique used in flash memory to prolong the life of the media. As data can be written to and erased from an address on flash memory a finite number of times, wear-levelling helps to distribute writes evenly across each memory block, thereby decreasing the wear on the media and increasing its lifetime.

Wearable smart devices

AKA wearables

Web address

Web address is a reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it.

Web applications

In computing, a web application or web app is a client server computer program that the client runs in a web browser.

Webcams

A video camera connected to a computer, allowing its images to be seen by internet users.

Website defacement

Illegitimate changes made to the appearance and content of a website. Often likened to graffiti or online vandalism.

WEP

Wired Equivalent Privacy

Whaling

A highly-targeted form of spearphishing that is aimed at senior executives within an organisation.

WhatsApp

WhatsApp is an American freeware, cross-platform messaging and voice over IP service owned by Facebook. It allows users to send text messages and voice messages, make voice and video calls, and share images, documents, user locations, and other media.

White hat

An ethical computer hacker, or a computer security expert, who specialises in penetration testing and in other testing methodologies to legally and legitimately ensure the security of an organisation's information systems. See also ‘black hat’ and ‘grey hat’.

Wi-Fi

A set of wireless communication protocols that can transmit traffic to Wi-Fi enabled devices within a local area. A Wi-Fi enabled device such as a laptop or mobile device can connect to the internet when within range of a wireless network connected to the internet. An area covered by one or more Wi-Fi access points is commonly called a hotspot.

Wi-Fi Protected Access 2

A protocol designed to replace the Wi-Fi Protected Access protocol for communicating information over wireless networks.

Wide Area Network

A telecommunications network or computer network that extends over a large geographical distance.

Windows

A graphical interface-based operating system developed by Microsoft.

Windows 10

Windows 10 is Microsoft operating system for personal computers, tablets, embedded devices and internet of things devices.

Windows 7

Windows 7 is an operating system that was produced by Microsoft as part of the Windows NT family of operating systems.

Windows 8.1

Windows 8.1 is an operating system that was produced by Microsoft and released as part of the Windows NT family of operating systems.

Windows Server 2008

Windows Server 2008 is a server operating system produced by Microsoft.

Windows Server 2008 R2

Windows Server 2008 R2 is a server operating system developed by Microsoft, which builds on the enhancements built into Windows Server 2008.

Wire Fraud

Wire fraud is a crime in which a person concocts a scheme to defraud or obtain money based on false representation or promises.

Wireless

Telecommunication involving signals transmitted by radio waves rather than over wires, also: the technology used in radio telecommunication.

Wireless Access Point

A device which enables communications between wireless clients. It is typically also the device which connects wired and wireless networks.

Wireless communications

The transmission of data over a communications path using electromagnetic waves rather than a wired medium.

Wireless local area network

A wireless local area network is a wireless distribution method for two or more devices that use high frequency radio waves and often include an access point to the internet.

Wireless network

A network based on the 802.11 standards.

WLAN

Wireless local area network

Women in Technology

Women in technology is an organisation that supports women in their STEAM careers. They help women by educating high school girls about the opportunities in science, technology, engineering, arts and maths, as well as providing networking and education for professionals.

Wordpress

WordPress is an open-source and free Web publishing application, content management system and blogging tool built by a community of developers and contributors.

Working from home

Work from home is a concept where the employee can do his or her job from home. Work from home gives a flexible working hour to the employee as well as the job for the employer is done with ease.

Workstation

A stand-alone or networked single-user computer.

World Backup Day

World Backup Day is a day for people to remember the importance of data and regular backups.

Worm

Self-replicating malware that uses a network to distribute copies of itself to other computer devices, often without user intervention. Worms need not attach themselves to existing programs.

WPA

Wi-Fi Protected Access

WPA2

Wi-Fi Protected Access 2