What are loop cards?

Loop cards are a great game that can be played individually or as a class. They are perfect for review key vocabulary or questions at the end of a topic or when revising for an exam.

Instructions

  1. Cut out the cards from the paper horizontally (but don't cut them in half!) and then shuffle them.
  2. Now start joining each question on the right hand side of the card to the matching answer on the next card.
  3. Carry on until all the cards loop together and you have competed the game!

Hint: Make sure that you set your paper to portrait to print 4 cards per sheet of A4 paper.

Edit Vocab

A cryptographic system that uses the same key for both encryption and decryption.
Wpa3
The latest standard for wireless network security, providing enhanced protection against various attacks.
Authentication Header
A protocol used in IPsec to provide data integrity, authentication, and anti-replay services.
Phishing
A fraudulent attempt to obtain sensitive information, such as passwords, by disguising as a trustworthy entity.
Encapsulating Security Payload
A protocol in IPsec that provides confidentiality, data integrity, and authentication of the packets.
User Agreement
A legally binding contract between a user and a service provider that establishes the terms and conditions for using the service.
Tunnel Mode
An IPsec configuration where the entire IP packet is encapsulated within another IP packet for secure communication between networks.
Key Exchange
The process of securely exchanging keys between parties in asymmetric encryption.
Key Management Protocol
A protocol used to establish security associations in IPsec, allowing the negotiation of keys and algorithms for secure communication.
Network Validation
The process of verifying that a network operates efficiently and satisfies the intended performance standards.
Symmetric Encryption