Access Point |
a device that allows wireless devices to connect to a wired network |
Authentication |
The process of verifying the identity of a user or device trying to connect to a network. |
Bandwidth |
the maximum amount of data that can be transmitted over a network |
Cracking |
The process of breaking the encryption of a network to gain unauthorized access. |
Encryption |
the process of encoding information to make it secure from unauthorized access |
Hotspot |
a physical location where people can access the internet, typically using Wi-Fi |
Internet Of Things |
A network of physical devices, vehicles, appliances, and other objects embedded with sensors, software, and network connectivity that enables them to collect and exchange data. |
Key |
A secret code used by the encryption algorithm to encrypt and decrypt data. |
Router |
a device that forwards data packets between computer networks |
SSID |
a unique identifier for a wireless network |
Security |
The measures taken to protect connected devices, networks, and data from unauthorized access, data breaches, or other cyber threats. |
Sensors |
Devices that detect physical or environmental input such as temperature, pressure, motion, or light, and convert it into an electrical signal. |
Signal Strength |
the power of a Wi-Fi signal, typically measured in decibels |
Smart Home |
A residence that has connected devices and systems which can be remotely controlled and automated to enhance comfort, convenience, and energy efficiency. |
Vulnerability |
A weakness or flaw in a system that can be exploited by attackers. |
Wifi |
a wireless networking technology that allows devices to connect to the internet via a router |