What are loop cards?

Loop cards are a great game that can be played individually or as a class. They are perfect for review key vocabulary or questions at the end of a topic or when revising for an exam.

Instructions

  1. Cut out the cards from the paper horizontally (but don't cut them in half!) and then shuffle them.
  2. Now start joining each question on the right hand side of the card to the matching answer on the next card.
  3. Carry on until all the cards loop together and you have competed the game!

Hint: Make sure that you set your paper to portrait to print 4 cards per sheet of A4 paper.

Edit Vocab

A documented set of procedures and guidelines that an organization follows when responding to and managing security incidents.
Antivirus
Software designed to detect and remove computer viruses, preventing them from spreading and causing harm to a computer network.
Insider Threats
Security risks posed by individuals within an organization, such as employees or former employees.
Public Key
In asymmetric encryption, a key that is publicly available and used for encryption.
Zombie Computers
Computers that have been infected by malware and can be remotely controlled without the knowledge of their owners, often used in DDoS attacks.
Digital Signature
A cryptographic mechanism that ensures the authenticity and integrity of digital messages or documents.
Intrusion Prevention System
A network security device that monitors and blocks malicious activities and prevents potential network attacks.
Network Validation
The process of verifying that a network operates efficiently and satisfies the intended performance standards.
Worm
A self-replicating program that spreads across computer networks and can cause harm by consuming system resources or deleting files.
Privileged Access
Elevated permissions and rights granted to select users within an organization, increasing the risk of insider threats.
Incident Response Plan