Acrónimos:
RPV (es), VPN
Ver:
· Túnel
Acrónimo de
virtual private network (red privada virtual). Una red informática donde
algunas conexiones son circuitos virtuales dentro de redes más extensas, como
Internet, en lugar de conexiones directas por medio de cables físicos. Cuando
este es caso, los puntos finales de una red virtual se transmiten a través de
una red mayor. Al contrario de una aplicación común, formada por comunicaciones
seguras en la red pública, una red VPN puede presentar o no funciones de
seguridad, como la autenticación y el cifrado de contenidos.
Una VPN se
puede utilizar con un token, tarjeta inteligente, etc., para proporcionar
autenticación de dos factores.
http://es.pcisecuritystandards.org
Las redes
privadas virtuales, también conocidas por sus siglas VPN (Virtual Private
Network), son una clase de redes que se configuran dentro de una red pública.
Para establecerlas, la integridad de los datos y la confidencialidad se
protegen mediante la autentificación y el cifrado.
http://www.inteco.es/glossary/Formacion/Glosario/
Mecanismo que
permite el establecimiento de una comunicación segura y flexible entre dos
nodos, entre un nodo y una red o entre dos redes cuando dicha comunicación ha
de atravesar un medio inseguro. [CCN-STIC-401:2007]
Conexión
segura entre dos extremos que utiliza como base una red insegura, normalmente
Internet. [CCN-STIC-612:2006]
Acronym for
virtual private network. A computer network in which some of connections are
virtual circuits within some larger network, such as the Internet, instead of
direct connections by physical wires. The end points of the virtual network are
said to be tunneled through the larger network when this is the case. While a
common application consists of secure communications through the public
Internet, a VPN may or may not have strong security features such as
authentication or content encryption. A VPN may be used with a token, smart
card, etc., to provide two-factor authentication.
https://www.pcisecuritystandards.org/security_standards/glossary.php
Protected
information system link utilizing tunneling, security controls (see Information
Assurance), and endpoint address translation giving the impression of a
dedicated line. [CNSSI_4009:2010]
(I) A
restricted-use, logical (i.e., artificial or simulated) computer network that
is constructed from the system resources of a relatively public, physical
(i.e., real) network (e.g., the Internet), often by using encryption (located
at hosts or gateways), and often by tunneling links of the virtual network
across the real network. (See: tunnel.) [RFC4949:2007]
Restricted-use
logical computer network that is constructed from the system resources of a
physical network, e.g. by using
encryption and/or by tunneling links of the virtual network across the real
network. [ISO-18028-1:2006]
a private network
utilising shared networks. E.g., A network based on a cryptographic tunnelling
protocol operating over another network infrastructure. [ISO-18028-4:2005]
Virtual network
built on top of existing networks that can provide a secure communications
mechanism for data and IP information transmitted between networks. [NIST-SP800-77:2005]
A VPN is the
application of encryption, data integrity,and authentication protocols to
provide a secure connection between a D/A and a remote device or user. The
authentication controls restrict the connection ability to only authorized
users; the encryption controls ensure data confidentiality between the D/A and
the remote device/user; the data integrity controls protect the data from
modification during transit between the D/A and the remote user. When the data
stream itself is also encrypted, the use of VPNs to send already-encrypted
communications through an encrypted tunnel constitutes a form of double
encryption.
Mobile Security
Reference Architecture, May 23, 2013
A restricted-use,
logical (i.e., artificial or simulated) computer network that is constructed
from the system resources of a relatively public, physical (i.e., real) network
(such as the Internet), often by using encryption (located at hosts or gateways),
and often by tunneling links of the virtual network across the real network.
For example, if a corporation has LANs at several different sites, each
connected to the Internet by a firewall, the corporation could create a VPN by
(a) using encrypted tunnels to connect from firewall to firewall across the
Internet and (b) not allowing any other traffic through the firewalls. A VPN is
generally less expensive to build and operate than a dedicated real network,
because the virtual network shares the cost of system resources with other
users of the real network.
http://www.sans.org/security-resources/glossary-of-terms/
Acronyme de «virtual
private network», réseau privé virtuel. Réseau informatique dans lequel
certaines connexions sont des circuits virtuels au sein dun réseau plus
important, comme Internet, remplaçant les connexions directes par des câbles
physiques. Les points terminaux du réseau virtuel sont alors tunnelisés à
travers le réseau de plus grande dimension. Alors quune application commune
consiste en plusieurs communications sécurisées par le réseau Internet public,
un VPN peut comporter ou non des fonctionnalités de sécurité, comme
lauthentification ou le cryptage de contenu. Un VPN peut être utilisé avec un
token, une carte à puce, etc., pour assurer une authentification à deux
facteurs.
http://fr.pcisecuritystandards.org/
Réseau d'ordinateurs
constituant un sous-réseau privé permettant l'échange d'informations à travers
des réseaux d'une autre topologie comme si les ordinateurs en communication
étaient situés au sein d'un même réseau local. Ces liaisons correspondent à des
chemins protégés empruntant les réseaux publics comme Internet. Généralement,
les VPN sont chiffrés afin de garantir la confidentialité des informations
échangées.
http://www.cases.public.lu/functions/glossaire/
Un VPN est un réseau de
données qui utilise les moyens de télécommunications d'un réseau public en
ajoutant des services de sécurité et des protocoles de tunneling.
Internet est en général
utilisé pour établir un VPN pour des raisons de coûts.
http://securit.free.fr/glossaire.htm
Temas relacionados