What are loop cards?

Loop cards are a great game that can be played individually or as a class. They are perfect for review key vocabulary or questions at the end of a topic or when revising for an exam.

Instructions

  1. Cut out the cards from the paper horizontally (but don't cut them in half!) and then shuffle them.
  2. Now start joining each question on the right hand side of the card to the matching answer on the next card.
  3. Carry on until all the cards loop together and you have competed the game!

Hint: Make sure that you set your paper to portrait to print 4 cards per sheet of A4 paper.

Edit Vocab

A type of cyber attack that floods a computer network with excessive traffic in order to disrupt normal operations.
Physical System Attacks
Attacks that exploit vulnerabilities in a physical system, such as tampering with hardware or interrupting power supply.
Network Segmentation
The process of dividing a computer network into smaller subnetworks for improved security and performance.
Intrusion Prevention System
A network security device that monitors and blocks malicious activities and prevents potential network attacks.
Mitigation
The process of reducing or eliminating the impact of a security incident or vulnerability by implementing preventive measures.
Network Security
Implementing measures to safeguard a network against unauthorized access, improper use, alteration, or disruption of service.
Malware
Malicious software designed to harm or exploit computers or networks.
Authentication
The act of confirming the identity of a user or device, with the purpose of granting access to a network or system.
Access Control
It involves implementing mechanisms that restrict user or device entry to specific resources or areas within a network.
Incident Response Plan
A documented set of procedures and guidelines that an organization follows when responding to and managing security incidents.
Ddos Attack