Loop cards are a great game that can be played individually or as a class. They are perfect for review key vocabulary or questions at the end of a topic or when revising for an exam.
Instructions
Cut out the cards from the paper horizontally (but don't cut them in half!) and then shuffle them.
Now start joining each question on the right hand side of the card to the matching answer on the next card.
Carry on until all the cards loop together and you have competed the game!
Hint: Make sure that you set your paper to portrait to print 4 cards per sheet of A4 paper.
A protocol suite used for securing communications by authenticating and encrypting each IP packet of a communication session.
Security Association
A set of security parameters negotiated between two IPsec peers for secure communication, including encryption algorithm, integrity algorithm, and keys.
Transport Mode
An IPsec configuration where only the payload of the IP packet is encrypted and authenticated, while the original IP header remains intact.
Key Management Protocol
A protocol used to establish security associations in IPsec, allowing the negotiation of keys and algorithms for secure communication.
Tunnel Mode
An IPsec configuration where the entire IP packet is encapsulated within another IP packet for secure communication between networks.
Access Control List
A set of rules that control network traffic by allowing or denying packets based on specified criteria such as source or destination IP address, port number, or protocol.
Authentication Header
A protocol used in IPsec to provide data integrity, authentication, and anti-replay services.
Encapsulating Security Payload
A protocol in IPsec that provides confidentiality, data integrity, and authentication of the packets.
Intrusion Detection System
A security tool that monitors network traffic for suspicious activity or security policy violations.