Loop cards are a great game that can be played individually or as a class. They are perfect for review key vocabulary or questions at the end of a topic or when revising for an exam.
Instructions
Cut out the cards from the paper horizontally (but don't cut them in half!) and then shuffle them.
Now start joining each question on the right hand side of the card to the matching answer on the next card.
Carry on until all the cards loop together and you have competed the game!
Hint: Make sure that you set your paper to portrait to print 4 cards per sheet of A4 paper.
A network security device that employs predetermined security rules to filter and regulate incoming and outgoing network traffic.
Penetration Testing
A controlled attempt to exploit vulnerabilities in a network to assess its level of security.
Private Key
In asymmetric encryption, a key that is kept secret and used for decryption.
Malware
Malicious software designed to harm or exploit computers or networks.
Salt
A random string of characters added to a password before hashing to protect against rainbow table attacks.
Brute Force Attacks
Where an attacker systematically tries all possible combinations of passwords in order to gain unauthorized access to a system.
Access Control
It involves implementing mechanisms that restrict user or device entry to specific resources or areas within a network.
Pretexting
A form of social engineering where attackers create a fictitious scenario to obtain information from individuals.
Proxy Firewalls
These firewalls act as intermediaries between users and the services they access, offering additional features like content filtering, logging, and anonymity through request and response management.
Mitigation
The process of reducing or eliminating the impact of a security incident or vulnerability by implementing preventive measures.