Term:Virtual Private Network

From FISMApedia
Revision as of 01:30, 27 October 2009 by DanPhilpott (talk) (1 revision)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

CNSSI 4009

Virtual Private Network (VPN) - Protected IS link utilizing tunneling, security controls (see information assurance), and end-point address translation giving the impression of a dedicated line.

DoDI 8551.01

Virtual Private Network - An encrypted tunnel that can transport Internet protocols between enclaves, thus masking their exposure. E2.1.21.

GAO-09-232G

Virtual Private Network (VPN) - Protected IS link utilizing tunneling, security controls (see information assurance), and end-point address translation giving the impression of a dedicated line.

NIST IR 7298

Virtual Private Network (VPN) - A virtual private network is a logical network that is established, at the application layer of the Open Systems Interconnection (OSI) model, over an existing physical network and typically does not include every node present on the physical network. SOURCE: SP 800-46

NIST SP 800-113

Virtual Private Network - A virtual network built on top of existing networks that can provide a secure communications mechanism for data and IP information transmitted between networks.

NIST SP 800-114

Virtual Private Network (VPN) - A tunnel that connects the teleworker's computer to the organization's network.

NIST SP 800-127 Draft

Virtual Private Network (VPN) - A logical network that is established at the upper layers of the OSI model over an existing physical network and typically does not include every node present on the physical network.

NIST SP 800-46r1

Virtual Private Network (VPN) - A virtual network, built on top of existing physical networks, that provides a secure communications tunnel for data and other information transmitted between networks.

NIST SP 800-46

Virtual Private Network (VPN) - A virtual private network is a logical network that is established, at the application layer of the OSI model, over an existing physical network and typically does not include every node present on the physical network. Authorized users are granted access to the logical network. For example, there are a number of systems that enable you to create networks using the Internet as the medium for transporting data. These systems use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.

NIST SP 800-47

Virtual Private Network (VPN) - A data network that enables two or more parties to communicate securely across a public network by creating a private connection, or "tunnel," between them.

NIST SP 800-48

Virtual Private Network (VPN) - A means by which certain authorized individuals (such as remote employees) can gain secure access to an organization's intranet by means of an extranet (a part of the internal network that is accessible via the Internet).

NIST SP 800-77

Virtual Private Network - Virtual network built on top of existing networks that can provide a secure communications mechanism for data and IP information transmitted between networks.

NIST SP 800-82 Final Draft

Virtual Private Network (VPN) - A restricted-use, logical (i.e., artificial or simulated) computer network that is constructed from the system resources of a relatively public, physical (i.e., real) network (such as the Internet), often by using encryption (located at hosts or gateways), and often by tunneling links of the virtual network across the real network. [RFC 2828, Internet Security Glossary, May 2000, http://rfc.net/rfc2828.html.]