Complete Security and VPN vocabulary guide
This friendly glossary explains every core VPN and security term in plain language. Each card groups related concepts so beginners quickly understand what matters, while power users can jump to deeper details without jargon.
Use it as a quick reference while comparing providers, tightening privacy settings, or reviewing how protocols like WireGuard and OpenVPN differ in practice.

Table of Content
VPN basics in one glance
Start with the everyday words: what a VPN does, how IP addresses reveal you, and why a tunnel keeps café Wi-Fi honest.
VPN (Virtual Private Network)
Core termA VPN is a private, encrypted lane through the internet. Websites see the VPN server instead of you, so your real location and IP stay hidden.
- Encrypts traffic so cafés, hotels, or ISPs cannot read it.
- Masks your IP address to prevent simple location tracking.
- Pairs best with a kill switch so nothing leaks if the tunnel drops.
IP address masking
PrivacyAn IP address is your device’s visible internet label. VPNs swap it with the VPN server’s IP so apps think you are somewhere else.
- Public IP: what streaming sites and shops see.
- Private IP: the address your home router gives devices.
- Geo-spoofing: choose a country to unlock content or pricing.
VPN tunnel
Secure pathA tunnel is the encrypted path between your device and the VPN server. It keeps data unreadable between the two ends.
- Encrypted tube your data travels through.
- Prevents Wi-Fi snooping in cafés, airports, and hotels.
- Works with modern protocols like WireGuard and OpenVPN.
VPN handshake
SetupThe handshake is the quick key exchange that sets up the encrypted tunnel securely.
- Negotiates keys so encryption cannot be guessed.
- Uses protocols like WireGuard or TLS in OpenVPN.
- Happens in milliseconds before data flows.
Privacy shields and leak protection
These terms explain how VPNs stop data leaks and keep your identity private.
Kill switch
Safety netA kill switch cuts your internet if the VPN connection drops so nothing leaks in the gap.
- Automatically stops traffic when the VPN tunnel fails.
- Prevents IP and DNS leaks during brief disconnects.
- Essential for public Wi-Fi or torrenting.
DNS leak protection
Leak stopDNS leak protection keeps your website lookups inside the VPN tunnel so your ISP cannot see them.
- Routes DNS requests through the VPN server.
- Prevents your ISP from logging visited domains.
- Test it with a leak checker after connecting.
No-log policy
TrustA no-log VPN does not store your activity. The strongest providers prove it with independent audits.
- No browsing or connection history kept.
- Audit reports confirm promises.
- Privacy-friendly jurisdictions reduce data requests.
Split tunneling
ControlSplit tunneling lets you choose which apps use the VPN while others stay on the local network.
- Send work apps through VPN; keep local devices direct.
- Reduces load while keeping key traffic private.
- Use carefully to avoid unprotected sensitive apps.
Speed, stability, and streaming
Understand what keeps VPN connections fast and how to avoid slowdowns.
VPN speed
PerformanceLatency is travel time and bandwidth is lane width. Closer servers and modern protocols keep speeds usable.
- Latency: distance plus congestion; pick nearby servers.
- UDP vs. TCP: UDP is faster for streaming; TCP is reliable for banking.
- MTU: right packet size prevents fragmentation and drops.
Streaming unlock
Secondary keyServers that unlock libraries and SmartDNS options help keep shows and sports available when you travel.
- Geo-blocking: content gates by country; VPN servers unlock it.
- Dedicated streaming routes cut buffering.
- Always-on VPN on mobile protects when hopping Wi-Fi networks.
Multi-hop routing
AdvancedMulti-hop routes traffic through two VPN servers for an extra privacy layer.
- Adds a second encrypted stop before the internet.
- Raises privacy but can reduce speed.
- Good for activists or investigative work.
Ping and jitter
PerformancePing measures delay and jitter measures delay variation. Both affect smooth streaming and gaming over VPN.
- Lower ping feels more responsive; choose closer servers.
- High jitter causes stutter in calls and streams.
- Stable protocols and nearby nodes reduce jitter.
Protocols, authentication, and business fit
Pick protocols that match your threat model, and learn the policies businesses need for remote work.
WireGuard protocol
ProtocolWireGuard is a lean, fast VPN protocol with modern cryptography and small code size.
- Fast reconnects and low latency.
- Small codebase that is easier to audit.
- Great on mobile and Wi-Fi hopping.
OpenVPN protocol
ProtocolOpenVPN is a long-audited VPN protocol that uses TLS to secure tunnels.
- Battle-tested and widely supported.
- Flexible: works over UDP or TCP.
- Strong community audits and plugins.
VPN authentication
IdentityAuthentication proves you are allowed in. VPNs pair passwords or keys with certificates and may add MFA.
- Certificates stop impostor servers.
- HMAC checks message integrity.
- MFA adds a second factor for admins.
Site-to-site VPN
TeamsSite-to-site VPNs link entire office networks so they act like one LAN over the internet.
- Connects branch offices securely.
- Great for shared drives and printers between sites.
- Relies on routers or gateways, not per-device apps.
VPN vocabulary FAQ
Quick answers to the most common questions readers ask about VPN wording, safety, and performance.