What are loop cards?

Loop cards are a great game that can be played individually or as a class. They are perfect for review key vocabulary or questions at the end of a topic or when revising for an exam.

Instructions

  1. Cut out the cards from the paper horizontally (but don't cut them in half!) and then shuffle them.
  2. Now start joining each question on the right hand side of the card to the matching answer on the next card.
  3. Carry on until all the cards loop together and you have competed the game!

Hint: Make sure that you set your paper to portrait to print 4 cards per sheet of A4 paper.

Edit Vocab

A form of attack where an unauthorized party intercepts and monitors communication on a network.
Spyware
Malware that secretly gathers information about a person or organization without their consent.
Mitigation
The process of reducing or eliminating the impact of a security incident or vulnerability by implementing preventive measures.
Spear Phishing
A targeted form of phishing where attackers tailor fraudulent emails to specific individuals or organizations.
Input Sanitation
The process of filtering and validating user input before using it in an application.
Brute Force Attacks
Where an attacker systematically tries all possible combinations of passwords in order to gain unauthorized access to a system.
Keylogger
Malware that records keystrokes on a computer without the user's knowledge, often used to steal login credentials or sensitive information.
Access Control
The practice of restricting and managing user access to network resources based on predetermined security policies.
Zombie Computers
Computers that have been infected by malware and can be remotely controlled without the knowledge of their owners, often used in DDoS attacks.
Phishing
A technique used by cybercriminals to trick individuals into revealing sensitive information by posing as a trustworthy entity.
Eavesdropping