Loop cards are a great game that can be played individually or as a class. They are perfect for review key vocabulary or questions at the end of a topic or when revising for an exam.
Instructions
Cut out the cards from the paper horizontally (but don't cut them in half!) and then shuffle them.
Now start joining each question on the right hand side of the card to the matching answer on the next card.
Carry on until all the cards loop together and you have competed the game!
Hint: Make sure that you set your paper to portrait to print 4 cards per sheet of A4 paper.
The process of reducing or eliminating the impact of a security incident or vulnerability by implementing preventive measures.
Two-Factor Authentication
A security measure that requires users to provide two separate forms of identification, typically a password and a unique code, to access a network or system.
Virtual Private Network
A secure network connection that allows remote users to access a private network over the internet securely.
Security Policy
A documented set of rules and procedures that define the organization's approach to network security and guide security implementations.
Network Segmentation
The process of dividing a computer network into smaller subnetworks for improved security and performance.
Acceptable Use Policy
A set of rules and guidelines that outline the proper and acceptable use of a system, network, or service.
Access Control
The practice of restricting and managing user access to network resources based on predetermined security policies.
Encryption
The process of converting plaintext data into an unreadable form to protect it from unauthorized access or theft.
Firewall
A network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules.
Incident Response Plan
A documented set of procedures and guidelines that an organization follows when responding to and managing security incidents.