What are loop cards?

Loop cards are a great game that can be played individually or as a class. They are perfect for review key vocabulary or questions at the end of a topic or when revising for an exam.

Instructions

  1. Cut out the cards from the paper horizontally (but don't cut them in half!) and then shuffle them.
  2. Now start joining each question on the right hand side of the card to the matching answer on the next card.
  3. Carry on until all the cards loop together and you have competed the game!

Hint: Make sure that you set your paper to portrait to print 4 cards per sheet of A4 paper.

Edit Vocab

A documented set of rules and procedures that define the organization's approach to network security and guide security implementations.
Trojan
A type of malware disguised as legitimate software, which allows unauthorized access to a computer or network.
Certificate Authority
An organization that issues digital certificates and verifies the authenticity of entities.
Pretexting
A form of social engineering where attackers create a fictitious scenario to obtain information from individuals.
Incident Response Plan
A documented set of procedures and guidelines that an organization follows when responding to and managing security incidents.
SQL Injection
A code injection technique that attackers use to exploit vulnerabilities in a web application's database layer.
Baiting
A social engineering technique that involves offering something enticing to trick individuals into revealing information or taking action.
Digital Certificate
An electronic document that confirms the credibility of a sender or receiver in a network communication.
Digital Signature
A cryptographic mechanism that ensures the authenticity and integrity of digital messages or documents.
Credentials
Information used to authenticate a user's identity, typically consisting of a username and password.
Security Policy