WPA is the name of a standard to encrypt a WLAN which can be used for older devices. If you use WPA, it is mandatory that you should follow our «6 rules for a secure password».
Wi-Fi Protected Access 2, Wireless Local Area Network
WPA2 builds on WPA, but uses the powerful AES algorithm to encrypt data transmission.
Advanced Encryption Standard, Wi-Fi Protected Access, Wireless Local Area Network
A WAN however is a network connecting computers and peripheral devices across large distances. This usually involves interconnecting different local networks.
Local Area Network
This is the Name of an obsolete standard to encrypt a WLAN.
Wireless Local Area Network
This is a cable-free, local network or a wireless network. WLANs are for instance used in private households, e. g. to surf wirelessly on your tablet from your sofa.
Advanced Encryption Standard, Local Area Network, Service Set Identifier, Wi-Fi Protected Access, Wi-Fi Protected Access 2, Wired Equivalent Privacy
The WWW was developed by the European Research Centre for Nuclear Physics (CERN) in Lausanne (Switzerland) as a hypermedia system for the Internet in 1993. The other agency involved in this development was the NCSA (National Center for Supercomputing Applications, University of Illinois, USA). By now, the WWW Consortium (W3C) is developing the WWW further. The WWW allows access to documents stored in servers spread out all across the globe. These documents are not pure text or hypertext documents though: This could involve any data stored in digital form, such as short video clips or files with spoken language.
Worms, just like viruses, are no longer such a widespread type of malware today. A worm is a small program which distributes copies by itself, e. g. via e-mail, SMS or via a vulnerability.
Participate in one of our «eBanking – but secure!» courses (in GERMAN, FRENCH and ITALIAN language only) and learn how the «5 steps for your security» can protect you when e-banking!
information / registration
Copyright © 2019 – All rights reserved. Lucerne School of Information Technologies