Comprehensive Security and VPN Terminology Guide

Last Update 29/01/2026

This approachable glossary clarifies all essential VPN and security terms in straightforward language. Each section groups related ideas, helping newcomers grasp key points swiftly, while advanced users can explore detailed explanations without technical jargon.

Use this as a handy guide when comparing providers, enhancing privacy settings, or understanding the practical differences between protocols such as WireGuard and OpenVPN.

An overview of VPN and security terms, including kill switch, no-logs policies, encryption techniques, and VPN protocols.
A straightforward VPN and security glossary that simplifies complex terms into useful, everyday choices.

VPN fundamentals at a glance

Begin with simple terms: what a VPN does, how IP addresses expose you, and why a tunnel secures café Wi-Fi.

VPN (Virtual Private Network)

Key concept

A VPN creates a private, encrypted channel across the internet. Websites detect the VPN server’s address, keeping your true location and IP concealed.

  • Encrypts data so cafés, hotels, or ISPs cannot intercept it.
  • Conceals your IP address to block straightforward location tracking.
  • Works best with a kill switch to prevent leaks if the connection fails.
View the complete VPN explanation

IP address concealment

Privacy

An IP address is your device’s public internet identifier. VPNs replace it with the server’s IP, making apps believe you’re in a different location.

  • Public IP: visible to streaming services and online stores.
  • Private IP: assigned by your home router to devices.
  • Geo-spoofing: select a country to access content or pricing.
Compare providers offering dependable IP masking

VPN tunnel

Secure connection

A tunnel is the encrypted route linking your device to the VPN server, keeping data secure and unreadable.

  • Encrypted channel for your data transmission.
  • Blocks Wi-Fi spying in cafés, airports, and hotels.
  • Compatible with modern protocols such as WireGuard and OpenVPN.
Discover how a VPN session initiates

VPN handshake

Initialisation

The handshake is a rapid key exchange establishing a secure encrypted tunnel.

  • Agrees encryption keys to prevent interception.
  • Employs protocols such as WireGuard or TLS within OpenVPN.
  • Occurs within milliseconds before data transfer begins.
Understand the VPN handshake process

Privacy safeguards and leak prevention

These terms describe how VPNs prevent data leaks and protect your identity.

Kill switch

Safety net

A kill switch disables your internet if the VPN disconnects, preventing data leaks.

  • Automatically halts traffic if the VPN tunnel breaks.
  • Blocks IP and DNS leaks during short disconnections.
  • Crucial for public Wi-Fi use or torrenting.
Keep the kill switch enabled

DNS leak protection

Leak prevention

DNS leak protection ensures your website queries stay within the VPN tunnel, hiding them from your ISP.

  • Directs DNS queries via the VPN server.
  • Stops your ISP from recording visited websites.
  • Check for leaks using an online tool after connecting.
Check your connection for leaks

No-log policy

Trust

A no-log VPN keeps no record of your activity. Leading providers verify this through independent audits.

  • No records of browsing or connection history are stored.
  • Audit reports validate these claims.
  • Privacy-friendly jurisdictions limit data requests.
Choose audited no-log VPNs

Split tunnelling

Control

Split tunnelling allows selection of apps to use the VPN while others access the local network directly.

  • Route work apps via VPN; local devices connect directly.
  • Lowers network load while securing important traffic.
  • Use cautiously to prevent exposing sensitive apps.
When to use split tunnelling

Performance, reliability, and streaming

Learn what maintains VPN speed and how to prevent slowdowns.

VPN speed

Performance

Latency is delay time; bandwidth is data capacity. Nearby servers and modern protocols maintain good speeds.

  • Latency depends on distance and congestion; choose nearby servers.
  • UDP is quicker for streaming; TCP offers reliability for banking.
  • MTU: correct packet size avoids fragmentation and loss.
Enhance VPN speed with optimal settings

Streaming access

Secondary feature

Servers unlocking libraries and SmartDNS help maintain access to shows and sports while travelling.

  • Geo-blocking restricts content by country; VPN servers bypass this.
  • Specialised streaming routes reduce buffering.
  • Always-on VPN on mobile safeguards when switching Wi-Fi networks.
View providers ideal for travel and streaming

Multi-hop routing

Advanced

Multi-hop sends traffic via two VPN servers for added privacy.

  • Introduces a second encrypted stage before reaching the internet.
  • Enhances privacy but may slow connection.
  • Suitable for activists or investigative purposes.
Learn how routers and multi-hop function

Ping and jitter

Performance

Ping measures delay; jitter measures delay variation. Both impact smooth streaming and gaming over VPN.

  • Lower ping improves responsiveness; select nearby servers.
  • High jitter causes interruptions in calls and streams.
  • Reliable protocols and close servers minimise jitter.
Find reliable, low-latency VPN servers

Protocols, authentication, and suitability for business

Select protocols suited to your threat model and understand business policies for remote work.

WireGuard protocol

Protocol

WireGuard is a lightweight, fast VPN protocol featuring modern cryptography and a compact codebase.

  • Quick reconnections and low latency.
  • Compact codebase facilitating easier audits.
  • Ideal for mobile use and switching Wi-Fi networks.
Opt for WireGuard when speed is essential

OpenVPN protocol

Protocol

OpenVPN is a well-audited VPN protocol employing TLS to secure tunnels.

  • Proven and widely supported.
  • Versatile: operates over UDP or TCP.
  • Robust community audits and plugin support.
Discover when OpenVPN is preferable

VPN authentication

Identity

Authentication verifies your access rights. VPNs combine passwords or keys with certificates and may include MFA.

  • Certificates prevent fake servers.
  • HMAC verifies message integrity.
  • MFA provides an additional authentication layer for administrators.
Understand the importance of strong authentication

Site-to-site VPN

Teams

Site-to-site VPNs connect whole office networks, making them function as a single LAN over the internet.

  • Securely links branch offices.
  • Ideal for shared drives and printers across locations.
  • Depends on routers or gateways rather than individual device apps.
Assess providers supporting site-to-site VPNs

VPN Terminology FAQ

Concise responses to frequent questions about VPN terms, security, and performance.