Loop cards are a great game that can be played individually or as a class. They are perfect for review key vocabulary or questions at the end of a topic or when revising for an exam.
Instructions
Cut out the cards from the paper horizontally (but don't cut them in half!) and then shuffle them.
Now start joining each question on the right hand side of the card to the matching answer on the next card.
Carry on until all the cards loop together and you have competed the game!
Hint: Make sure that you set your paper to portrait to print 4 cards per sheet of A4 paper.
An attack where an attacker physically taps into a network cable to intercept data passing through.
Ddos Attack
A type of cyber attack that floods a computer network with excessive traffic in order to disrupt normal operations.
Amplification Attack
A type of DDoS attack that uses amplification techniques to magnify the volume of traffic sent to a target, making the attack more effective.
Social Engineering
The act of manipulating people into performing actions or divulging confidential information.
Trojan
A type of malware disguised as legitimate software, which allows unauthorized access to a computer or network.
Encryption
The process of converting plaintext into ciphertext using an encryption algorithm and a key.
Biometric Authentication
Unique physical or behavioral characteristics like fingerprints or iris scans are utilized to verify an individual's identity through the process of authentication.
Botnet
A network of infected computers, or bots, that are controlled remotely and used to carry out DDoS attacks or other malicious activities.
Privileged Access
Elevated permissions and rights granted to select users within an organization, increasing the risk of insider threats.
Antivirus
A software program designed to detect, prevent, and remove computer viruses and other malicious software.