Loop cards are a great game that can be played individually or as a class. They are perfect for review key vocabulary or questions at the end of a topic or when revising for an exam.
Instructions
Cut out the cards from the paper horizontally (but don't cut them in half!) and then shuffle them.
Now start joining each question on the right hand side of the card to the matching answer on the next card.
Carry on until all the cards loop together and you have competed the game!
Hint: Make sure that you set your paper to portrait to print 4 cards per sheet of A4 paper.
The process of securely exchanging keys between parties in asymmetric encryption.
Decryption
The process of converting ciphertext into plaintext using a decryption algorithm and a key.
Private Key
In asymmetric encryption, a key that is kept secret and used for decryption.
Network Validation
The process of verifying that a network operates efficiently and satisfies the intended performance standards.
Security Audit
The process of assessing a network's security measures to identify weaknesses, evaluate potential threats, and suggest enhancements.
Authentication
The act of confirming the identity of a user or device, with the purpose of granting access to a network or system.
Digital Certificate
An electronic document that confirms the credibility of a sender or receiver in a network communication.
Intrusion Detection System
A monitoring solution, whether it's in the form of software or hardware, which oversees network traffic to acknowledge and take action against potential security threats or attacks.
Asymmetric Encryption
A cryptographic system that uses two different keys: a public key for encryption and a private key for decryption.
Digital Signature
A cryptographic mechanism that ensures the authenticity and integrity of digital messages or documents.