Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

virtual private network (VPN)

Abbreviation(s) and Synonym(s):

VPN

Definition(s):

  Protected information system link utilizing tunneling, security controls, and endpoint address translation giving the impression of a dedicated line.
Source(s):
NIST SP 800-53 Rev. 4 under Virtual Private Network (CNSSI 4009)

  A restricted-use, logical (i.e., artificial or simulated) computer network that is constructed from the system resources of a relatively public, physical (i.e., real) network (such as the Internet), often by using encryption (located at hosts or gateways), and often by tunneling links of the virtual network across the real network.
Source(s):
NIST SP 800-82 Rev. 2 under Virtual Private Network (VPN) (RFC 4949)

  A data network that enables two or more parties to communicate securely across a public network by creating a private connection, or “tunnel,” between them.
Source(s):
NIST SP 800-47 under Virtual Private Network (VPN)

  A virtual network built on top of existing networks that can provide a secure communications mechanism for data and IP information transmitted between networks.
Source(s):
NIST SP 800-113 under Virtual Private Network

  Virtual network built on top of existing networks that can provide a secure communications mechanism for data and IP information transmitted between networks.
Source(s):
NIST SP 800-77 under Virtual Private Network

  A tunnel that connects the teleworker’s computer to the organization’s network.
Source(s):
NIST SP 800-114 under Virtual Private Network (VPN) [Superseded]

  A logical network that is established at the network layer of the OSI model. The logical network typically provides authentication and data confidentiality services for some subset of a larger physical network.
Source(s):
NIST SP 800-127 under Virtual private network (VPN)

  Protected information system link utilizing tunneling, security controls (see information assurance (IA)), and endpoint address translation giving the impression of a dedicated line.
Source(s):
CNSSI 4009-2015