Virtual private network vpn
A virtual private network (vpn) extends a private network across a public network, such as the internet. Vpn enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. A vpn is created by establishing a virtual point-to-point connection through the use of dedicated connections, virtual tunneling protocols, or traffic encryption. For example, if a corporation has lans at several different sites, each connected to the internet by a firewall, the corporation could create a vpn by (a) using encrypted tunnels to connect from firewall to firewall across the internet and (b) not allowing any other traffic through the firewalls. A vpn is generally less expensive to build and operate than a dedicated real network, because the virtual network shares the cost of system resources with other users of the real network.
Virus
A virus is a hidden, self-replicating section of a computer software or program, usually malicious logic, that propagates by infecting, i.e., inserting a copy of itself into and becoming part of another program. A virus cannot run by itself and requires that its host program be run to make the virus active.
Voice firewall
A voice firewall is a physical discontinuity in a voice network that monitors, alerts, and controls inbound and outbound voice network activity based on user-defined call admission control (cac) policies, voice application layer security threats or unauthorized service use violations.
Voice intrusion prevention system vips
A voice intrusion prevention system (vips) is a security management system for voice networks that monitors voice traffic for multiple calling patterns or attack/abuse signatures to proactively detect and prevent toll fraud, denial of service, telecom attacks, service abuse, and other anomalous activities.