Loop cards are a great game that can be played individually or as a class. They are perfect for review key vocabulary or questions at the end of a topic or when revising for an exam.
Instructions
Cut out the cards from the paper horizontally (but don't cut them in half!) and then shuffle them.
Now start joining each question on the right hand side of the card to the matching answer on the next card.
Carry on until all the cards loop together and you have competed the game!
Hint: Make sure that you set your paper to portrait to print 4 cards per sheet of A4 paper.
A network security device that employs predetermined security rules to filter and regulate incoming and outgoing network traffic.
Decryption
The process of converting ciphertext into plaintext using a decryption algorithm and a key.
Network Security
Implementing measures to safeguard a network against unauthorized access, improper use, alteration, or disruption of service.
Private Key
In asymmetric encryption, a key that is kept secret and used for decryption.
Key Pair
A pair of cryptographic keys, consisting of a public key and a private key.
Biometric Authentication
Unique physical or behavioral characteristics like fingerprints or iris scans are utilized to verify an individual's identity through the process of authentication.
Authentication Factor
A piece of information used to authenticate a user's identity, such as a password or biometric data.
Phishing
A fraudulent attempt to obtain sensitive information, such as passwords, by disguising as a trustworthy entity.
Salt
A random string of characters added to a password before hashing to protect against rainbow table attacks.
Authentication
The act of confirming the identity of a user or device, with the purpose of granting access to a network or system.