What are loop cards?

Loop cards are a great game that can be played individually or as a class. They are perfect for review key vocabulary or questions at the end of a topic or when revising for an exam.

Instructions

  1. Cut out the cards from the paper horizontally (but don't cut them in half!) and then shuffle them.
  2. Now start joining each question on the right hand side of the card to the matching answer on the next card.
  3. Carry on until all the cards loop together and you have competed the game!

Hint: Make sure that you set your paper to portrait to print 4 cards per sheet of A4 paper.

Edit Vocab

The process of converting plaintext into ciphertext using an encryption algorithm and a key.
Impersonation
A social engineering tactic where attackers pretend to be someone else to deceive individuals and gain access to confidential information.
Security Policy
A documented set of rules and procedures that define the organization's approach to network security and guide security implementations.
Physical System Attacks
Attacks that exploit vulnerabilities in a physical system, such as tampering with hardware or interrupting power supply.
Symmetric Encryption
A cryptographic system that uses the same key for both encryption and decryption.
Spyware
Malware that secretly gathers information about a person or organization without their consent.
Phishing
A fraudulent attempt to obtain sensitive information, such as passwords, by disguising as a trustworthy entity.
Internet Usage Policy
A policy that governs the appropriate use of the internet and outlines the rules for accessing and using online resources.
Incident Response Plan
A documented set of procedures and guidelines that an organization follows when responding to and managing security incidents.
Hashing
The process of converting a password into a fixed-length string of characters using a cryptographic algorithm.
Encryption