What are loop cards?

Loop cards are a great game that can be played individually or as a class. They are perfect for review key vocabulary or questions at the end of a topic or when revising for an exam.

Instructions

  1. Cut out the cards from the paper horizontally (but don't cut them in half!) and then shuffle them.
  2. Now start joining each question on the right hand side of the card to the matching answer on the next card.
  3. Carry on until all the cards loop together and you have competed the game!

Hint: Make sure that you set your paper to portrait to print 4 cards per sheet of A4 paper.

Edit Vocab

A policy that governs the appropriate use of the internet and outlines the rules for accessing and using online resources.
Acceptable Use Policy
A set of rules and guidelines that outline the proper and acceptable use of a system, network, or service.
Baiting
A social engineering technique that involves offering something enticing to trick individuals into revealing information or taking action.
Packet Flooding
A technique used in DDoS attacks where a large number of packets are sent to a target, overwhelming its capacity to process them.
Salt
A random string of characters added to a password before hashing to protect against rainbow table attacks.
Key Pair
A pair of cryptographic keys, consisting of a public key and a private key.
Pretexting
A form of social engineering where attackers create a fictitious scenario to obtain information from individuals.
Rootkit
Malware that enables unauthorized access to a computer, while hiding its presence from the user and antivirus software.
Network Security Audit
A process of assessing the security measures implemented in a network to identify vulnerabilities and potential risks.
Ddos Attack
A type of cyber attack that floods a computer network with excessive traffic in order to disrupt normal operations.
Internet Usage Policy