Loop cards are a great game that can be played individually or as a class. They are perfect for review key vocabulary or questions at the end of a topic or when revising for an exam.
Instructions
Cut out the cards from the paper horizontally (but don't cut them in half!) and then shuffle them.
Now start joining each question on the right hand side of the card to the matching answer on the next card.
Carry on until all the cards loop together and you have competed the game!
Hint: Make sure that you set your paper to portrait to print 4 cards per sheet of A4 paper.
In asymmetric encryption, a key that is publicly available and used for encryption.
Keylogger
Malware that records keystrokes on a computer without the user's knowledge, often used to steal login credentials or sensitive information.
Digital Certificate
An electronic document that confirms the credibility of a sender or receiver in a network communication.
Tailgating
A method of social engineering where an unauthorized person follows an authorized individual to gain access to a restricted area.
Baiting
A social engineering technique that involves offering something enticing to trick individuals into revealing information or taking action.
Input Sanitation
The process of filtering and validating user input before using it in an application.
Decryption
The process of converting ciphertext into plaintext using a decryption algorithm and a key.
Biometric Authentication
Unique physical or behavioral characteristics like fingerprints or iris scans are utilized to verify an individual's identity through the process of authentication.
Pretexting
A form of social engineering where attackers create a fictitious scenario to obtain information from individuals.
Spear Phishing
A targeted form of phishing where attackers tailor fraudulent emails to specific individuals or organizations.