It is the practice of protecting computer systems, networks, and data from unauthorised access, damage, or theft.
It encompasses a range of technologies, processes, and policies aimed at reducing the risks of cyberattacks.
Otherwise, this can lead to financial losses, reputational damage, and operational disruption.
Try this online resource for Network Matchup practice online using this link!
Now, try drawing your own network using this link
Challenge: Can you draw the network you are using at home to access our site?
Upload your drawings to be checked by our team using the instructions below
Click here to upload your worksheet. The worksheet should either be a .pdf file, Word document or photo of your work.
This link leads to a Google Form which requires a Google account to use.