Wireless fidelity

Wireless fidelity, commonly known as Wi-Fi, is a technology that allows devices such as computers and other digital devices to connect to the internet.

Back to glossary

Wireless Fidelity, commonly known as Wi-Fi, is a technology that allows devices such as computers, smartphones, and other digital devices to connect to the internet or communicate with one another wirelessly within a certain area. This technology has revolutionized the way we access and share information, making it an integral part of our daily lives.

Wi-Fi is a crucial aspect of cybersecurity, as it involves the transmission of sensitive data over networks that could potentially be accessed by unauthorized individuals. Therefore, understanding how Wi-Fi works and the security measures that can be implemented to protect these networks is essential. This glossary entry will provide a comprehensive explanation of Wi-Fi, its functioning, and its relevance to cybersecurity.

Origins of Wi-Fi

The term Wi-Fi was coined by the Wi-Fi Alliance, a trade association that promotes the standard for wireless LAN and certifies products if they conform to certain standards of interoperability. Notably, despite popular belief, Wi-Fi does not stand for "Wireless Fidelity". It is simply a trademarked phrase that means IEEE 802.11x.

The development of Wi-Fi began in the 1970s and 80s, with the creation of wireless networks. However, it wasn't until the late 1990s that Wi-Fi as we know it today started to take shape. In 1997, the Institute of Electrical and Electronics Engineers (IEEE) created the first standard for wireless networks, known as 802.11.

Evolution of Wi-Fi standards

Since the creation of the original 802.11 standard, several new standards have been introduced to improve the speed, range, and reliability of wireless networks. These include 802.11a, 802.11b, 802.11g, 802.11n, and 802.11ac, each offering different capabilities and operating at different frequencies.

Most recently, the 802.11ax standard, also known as Wi-Fi 6, was introduced. This standard offers faster speeds, improved capacity, and better performance in congested areas, making it ideal for today's increasingly connected world.

How Wi-Fi works

Wi-Fi works by using radio waves to transmit information between devices. This is done through a wireless adapter that translates data into a radio signal and a wireless router that decodes the signal and sends the information to the Internet through a wired Ethernet connection.

When a device wants to connect to a Wi-Fi network, it will scan for available networks and attempt to connect to the one that has the strongest signal and is within its range. Once connected, the device can send and receive data over the network.

Wi-Fi frequencies

Wi-Fi networks operate on two main frequencies: 2.4 GHz and 5 GHz. The 2.4 GHz band is used by a large number of devices, including microwaves and cordless phones, and is more susceptible to interference. However, it offers a longer range than the 5 GHz band.

The 5 GHz band, on the other hand, offers faster speeds and is less prone to interference, but has a shorter range. Many modern Wi-Fi routers are dual-band, meaning they can operate on both frequencies simultaneously, offering the benefits of both.

Wi-Fi and cybersecurity

Wi-Fi networks, while convenient, are also a potential security risk. Because the information transmitted over a Wi-Fi network is broadcasted wirelessly, it can potentially be intercepted by unauthorized individuals. Therefore, it's crucial to implement security measures to protect these networks.

There are several types of Wi-Fi security protocols that can be used to protect a network, including WEP, WPA, WPA2, and WPA3. These protocols encrypt the data transmitted over the network, making it more difficult for unauthorized individuals to access.

Wi-Fi security protocols

WEP, or Wired Equivalent Privacy, was the first security protocol introduced for Wi-Fi networks. However, it has been found to have several vulnerabilities and is now considered insecure.

WPA, or Wi-Fi Protected Access, was introduced as a replacement for WEP. It offers improved security, but has also been found to have vulnerabilities. WPA2, the second version of WPA, offers even better security and is currently the most commonly used protocol. WPA3, the latest version, offers further improvements and is expected to replace WPA2 in the future.

Wi-Fi and the future

As the world becomes increasingly connected, the importance of Wi-Fi will continue to grow. With the introduction of new technologies such as the Internet of Things (IoT) and smart homes, the demand for reliable, high-speed wireless networks is greater than ever.

At the same time, the need for secure Wi-Fi networks is also increasing. As more and more sensitive information is transmitted over these networks, the potential for cyber attacks also increases. Therefore, understanding and implementing Wi-Fi security measures is crucial.

Wi-Fi 6 and beyond

Wi-Fi 6, the latest Wi-Fi standard, offers significant improvements over previous standards. With faster speeds, improved capacity, and better performance in congested areas, Wi-Fi 6 is well-suited to meet the demands of the modern, connected world.

Looking to the future, the development of Wi-Fi 7 is already underway. While it's still in the early stages, Wi-Fi 7 promises to offer even faster speeds and better performance. As these new standards are introduced, the importance of understanding and securing Wi-Fi networks will only continue to grow.

Author Sofie Meyer

About the author

Sofie Meyer is a copywriter and phishing aficionado here at Moxso. She has a master´s degree in Danish and a great interest in cybercrime, which resulted in a master thesis project on phishing.

Disclaimer: This page is generated by a large language model (LLM). Verify information, consult experts when needed, and exercise discretion as it may produce occasional inappropriate content.

Similar definitions

Speech synthesis Concurrent use Not safe for work (NSFW) Personal digital assistant (PDA) Backslash Intranet VMware Network throttling Stuxnet OpenDNS Network Chief technology officer (CTO) Cryptography Borland database engine (BDE) Tautology