Complete Security and VPN vocabulary guide

Last Update 1/29/2026

This friendly glossary explains every core VPN and security term in plain language. Each card groups related concepts so beginners quickly understand what matters, while power users can jump to deeper details without jargon.

Use it as a quick reference while comparing providers, tightening privacy settings, or reviewing how protocols like WireGuard and OpenVPN differ in practice.

VPN and security glossary overview explaining kill switch, no-log policies, encryption methods, and VPN protocols
A clear security and VPN glossary that turns complex terms into practical, everyday decisions.

VPN basics in one glance

Start with the everyday words: what a VPN does, how IP addresses reveal you, and why a tunnel keeps café Wi-Fi honest.

VPN (Virtual Private Network)

Core term

A VPN is a private, encrypted lane through the internet. Websites see the VPN server instead of you, so your real location and IP stay hidden.

  • Encrypts traffic so cafés, hotels, or ISPs cannot read it.
  • Masks your IP address to prevent simple location tracking.
  • Pairs best with a kill switch so nothing leaks if the tunnel drops.
See the full VPN explainer

IP address masking

Privacy

An IP address is your device’s visible internet label. VPNs swap it with the VPN server’s IP so apps think you are somewhere else.

  • Public IP: what streaming sites and shops see.
  • Private IP: the address your home router gives devices.
  • Geo-spoofing: choose a country to unlock content or pricing.
Compare providers with reliable IP masking

VPN tunnel

Secure path

A tunnel is the encrypted path between your device and the VPN server. It keeps data unreadable between the two ends.

  • Encrypted tube your data travels through.
  • Prevents Wi-Fi snooping in cafés, airports, and hotels.
  • Works with modern protocols like WireGuard and OpenVPN.
Learn how a VPN session starts

VPN handshake

Setup

The handshake is the quick key exchange that sets up the encrypted tunnel securely.

  • Negotiates keys so encryption cannot be guessed.
  • Uses protocols like WireGuard or TLS in OpenVPN.
  • Happens in milliseconds before data flows.
Understand the VPN handshake

Privacy shields and leak protection

These terms explain how VPNs stop data leaks and keep your identity private.

Kill switch

Safety net

A kill switch cuts your internet if the VPN connection drops so nothing leaks in the gap.

  • Automatically stops traffic when the VPN tunnel fails.
  • Prevents IP and DNS leaks during brief disconnects.
  • Essential for public Wi-Fi or torrenting.
Keep the kill switch on

DNS leak protection

Leak stop

DNS leak protection keeps your website lookups inside the VPN tunnel so your ISP cannot see them.

  • Routes DNS requests through the VPN server.
  • Prevents your ISP from logging visited domains.
  • Test it with a leak checker after connecting.
Test if your connection leaks

No-log policy

Trust

A no-log VPN does not store your activity. The strongest providers prove it with independent audits.

  • No browsing or connection history kept.
  • Audit reports confirm promises.
  • Privacy-friendly jurisdictions reduce data requests.
Pick audited, no-log VPNs

Split tunneling

Control

Split tunneling lets you choose which apps use the VPN while others stay on the local network.

  • Send work apps through VPN; keep local devices direct.
  • Reduces load while keeping key traffic private.
  • Use carefully to avoid unprotected sensitive apps.
When to use split tunneling

Speed, stability, and streaming

Understand what keeps VPN connections fast and how to avoid slowdowns.

VPN speed

Performance

Latency is travel time and bandwidth is lane width. Closer servers and modern protocols keep speeds usable.

  • Latency: distance plus congestion; pick nearby servers.
  • UDP vs. TCP: UDP is faster for streaming; TCP is reliable for banking.
  • MTU: right packet size prevents fragmentation and drops.
Improve VPN speed with the right settings

Streaming unlock

Secondary key

Servers that unlock libraries and SmartDNS options help keep shows and sports available when you travel.

  • Geo-blocking: content gates by country; VPN servers unlock it.
  • Dedicated streaming routes cut buffering.
  • Always-on VPN on mobile protects when hopping Wi-Fi networks.
See providers strong for travel and streaming

Multi-hop routing

Advanced

Multi-hop routes traffic through two VPN servers for an extra privacy layer.

  • Adds a second encrypted stop before the internet.
  • Raises privacy but can reduce speed.
  • Good for activists or investigative work.
See how routers and multi-hop work

Ping and jitter

Performance

Ping measures delay and jitter measures delay variation. Both affect smooth streaming and gaming over VPN.

  • Lower ping feels more responsive; choose closer servers.
  • High jitter causes stutter in calls and streams.
  • Stable protocols and nearby nodes reduce jitter.
Find stable, low-latency VPN servers

Protocols, authentication, and business fit

Pick protocols that match your threat model, and learn the policies businesses need for remote work.

WireGuard protocol

Protocol

WireGuard is a lean, fast VPN protocol with modern cryptography and small code size.

  • Fast reconnects and low latency.
  • Small codebase that is easier to audit.
  • Great on mobile and Wi-Fi hopping.
Choose WireGuard when speed matters

OpenVPN protocol

Protocol

OpenVPN is a long-audited VPN protocol that uses TLS to secure tunnels.

  • Battle-tested and widely supported.
  • Flexible: works over UDP or TCP.
  • Strong community audits and plugins.
See when OpenVPN is the better fit

VPN authentication

Identity

Authentication proves you are allowed in. VPNs pair passwords or keys with certificates and may add MFA.

  • Certificates stop impostor servers.
  • HMAC checks message integrity.
  • MFA adds a second factor for admins.
See why strong authentication matters

Site-to-site VPN

Teams

Site-to-site VPNs link entire office networks so they act like one LAN over the internet.

  • Connects branch offices securely.
  • Great for shared drives and printers between sites.
  • Relies on routers or gateways, not per-device apps.
Evaluate site-to-site capable providers

VPN vocabulary FAQ

Quick answers to the most common questions readers ask about VPN wording, safety, and performance.