What are loop cards?

Loop cards are a great game that can be played individually or as a class. They are perfect for review key vocabulary or questions at the end of a topic or when revising for an exam.

Instructions

  1. Cut out the cards from the paper horizontally (but don't cut them in half!) and then shuffle them.
  2. Now start joining each question on the right hand side of the card to the matching answer on the next card.
  3. Carry on until all the cards loop together and you have competed the game!

Hint: Make sure that you set your paper to portrait to print 4 cards per sheet of A4 paper.

Edit Vocab

A type of malware that self-replicates and infects other files or systems.
Firewall
A network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules.
Brute Force Attacks
Where an attacker systematically tries all possible combinations of passwords in order to gain unauthorized access to a system.
SQL Injection
A code injection technique that attackers use to exploit vulnerabilities in a web application's database layer.
Vulnerability Scanning
The process of identifying and assessing security vulnerabilities in a network infrastructure to address and mitigate potential risks.
Keylogger
Malware that records keystrokes on a computer without the user's knowledge, often used to steal login credentials or sensitive information.
Spyware
Malware that secretly gathers information about a person or organization without their consent.
Tampering
An attack where an attacker alters data or devices in a network to disrupt operations or gain unauthorized access.
Network Security Audit
A process of assessing the security measures implemented in a network to identify vulnerabilities and potential risks.
Malware
Malicious software designed to harm or exploit computers or networks.
Virus