Acrónimo de
“virtual private network” (red privada virtual). Una red informática donde
algunas conexiones son circuitos virtuales dentro de redes más extensas, como
Internet, en lugar de conexiones directas por medio de cables físicos. Cuando
este es caso, los puntos finales de una red virtual se transmiten a través de
una red mayor. Al contrario de una aplicación común, formada por comunicaciones
seguras en la red pública, una red VPN puede presentar o no funciones de
seguridad, como la autenticación y el cifrado de contenidos.
Una VPN se
puede utilizar con un token, tarjeta inteligente, etc., para proporcionar
autenticación de dos factores.
http://es.pcisecuritystandards.org
Las redes
privadas virtuales, también conocidas por sus siglas VPN (Virtual Private
Network), son una clase de redes que se configuran dentro de una red pública.
Para establecerlas, la integridad de los datos y la confidencialidad se
protegen mediante la autentificación y el cifrado.
http://www.inteco.es/glossary/Formacion/Glosario/
Mecanismo que
permite el establecimiento de una comunicación segura y flexible entre dos
nodos, entre un nodo y una red o entre dos redes cuando dicha comunicación ha
de atravesar un medio inseguro. [CCN-STIC-401:2007]
Conexión
segura entre dos extremos que utiliza como base una red insegura, normalmente
Internet. [CCN-STIC-612:2006]
Acronym for “virtual private
network.” A computer network in which some of connections are virtual circuits
within some larger network, such as the Internet, instead of direct connections
by physical wires. The end points of the virtual network are said to be
tunneled through the larger network when this is the case. While a common
application consists of secure communications through the public Internet, a
VPN may or may not have strong security features such as authentication or
content encryption. A VPN may be used with a token, smart card, etc., to
provide two-factor authentication.
https://www.pcisecuritystandards.org/security_standards/glossary.php
Protected information system
link utilizing tunneling, security controls (see Information Assurance), and
endpoint address translation giving the impression of a dedicated line. [CNSSI_4009:2010]
(I) A restricted-use,
logical (i.e., artificial or simulated) computer network that is constructed
from the system resources of a relatively public, physical (i.e., real) network
(e.g., the Internet), often by using encryption (located at hosts or gateways),
and often by tunneling links of the virtual network across the real network. (See: tunnel.) [RFC4949:2007]
Restricted-use logical
computer network that is constructed from the system resources of a physical
network, e.g. by using encryption and/or
by tunneling links of the virtual network across the real network. [ISO-18028-1:2006]
a private network utilising
shared networks. E.g., A network based on a cryptographic tunnelling protocol
operating over another network infrastructure. [ISO-18028-4:2005]
Virtual network built on top
of existing networks that can provide a secure communications mechanism for
data and IP information transmitted between networks. [NIST-SP800-77:2005]
A VPN is the application of
encryption, data integrity,and authentication protocols to provide a secure
connection between a D/A and a remote device or user. The authentication
controls restrict the connection ability to only authorized users; the
encryption controls ensure data confidentiality between the D/A and the remote
device/user; the data integrity controls protect the data from modification
during transit between the D/A and the remote user. When the data stream itself
is also encrypted, the use of VPNs to send already-encrypted communications
through an encrypted tunnel constitutes a form of double encryption.
Mobile Security Reference
Architecture, May 23, 2013
A restricted-use, logical
(i.e., artificial or simulated) computer network that is constructed from the
system resources of a relatively public, physical (i.e., real) network (such as
the Internet), often by using encryption (located at hosts or gateways), and
often by tunneling links of the virtual network across the real network. For
example, if a corporation has LANs at several different sites, each connected
to the Internet by a firewall, the corporation could create a VPN by (a) using
encrypted tunnels to connect from firewall to firewall across the Internet and
(b) not allowing any other traffic through the firewalls. A VPN is generally
less expensive to build and operate than a dedicated real network, because the
virtual network shares the cost of system resources with other users of the
real network.
http://www.sans.org/security-resources/glossary-of-terms/
Acronyme de «virtual
private network», réseau privé virtuel. Réseau informatique dans lequel
certaines connexions sont des circuits virtuels au sein d’un réseau plus
important, comme Internet, remplaçant les connexions directes par des câbles
physiques. Les points terminaux du réseau virtuel sont alors tunnelisés à
travers le réseau de plus grande dimension. Alors qu’une application commune
consiste en plusieurs communications sécurisées par le réseau Internet public,
un VPN peut comporter ou non des fonctionnalités de sécurité, comme
l’authentification ou le cryptage de contenu. Un VPN peut être utilisé avec un
token, une carte à puce, etc., pour assurer une authentification à deux
facteurs.
http://fr.pcisecuritystandards.org/
Réseau d'ordinateurs
constituant un sous-réseau privé permettant l'échange d'informations à travers
des réseaux d'une autre topologie comme si les ordinateurs en communication
étaient situés au sein d'un même réseau local. Ces liaisons correspondent à des
chemins protégés empruntant les réseaux publics comme Internet. Généralement,
les VPN sont chiffrés afin de garantir la confidentialité des informations
échangées.
http://www.cases.public.lu/functions/glossaire/
Un VPN est un réseau de
données qui utilise les moyens de télécommunications d'un réseau public en
ajoutant des services de sécurité et des protocoles de tunneling.
Internet est en général
utilisé pour établir un VPN pour des raisons de coûts.
http://securit.free.fr/glossaire.htm