war dialing
An attack in which a long list of phone numbers is inserted into a war-dialing program in the hope of finding a modem that can be exploited to gain unauthorized access.
whitelist
A set of known good resources such as IP addresses, domain names, or applications.
work factor
The estimated time and effort required for an attacker to overcome a security control.
worm
An independent program that can reproduce by copying itself from one system to another. It may damage data directly or degrade system performance by tying up resources.
write
An operation that results in the flow of information from a subject to an object.