What are loop cards?

Loop cards are a great game that can be played individually or as a class. They are perfect for review key vocabulary or questions at the end of a topic or when revising for an exam.

Instructions

  1. Cut out the cards from the paper horizontally (but don't cut them in half!) and then shuffle them.
  2. Now start joining each question on the right hand side of the card to the matching answer on the next card.
  3. Carry on until all the cards loop together and you have competed the game!

Hint: Make sure that you set your paper to portrait to print 4 cards per sheet of A4 paper.

Edit Vocab

A process of assessing the security measures implemented in a network to identify vulnerabilities and potential risks.
Security Policy
A documented set of rules and procedures that define the organization's approach to network security and guide security implementations.
Network Segmentation
The process of dividing a computer network into smaller subnetworks for improved security and performance.
Credentials
Information used to authenticate a user's identity, typically consisting of a username and password.
Network Security
Implementing measures to safeguard a network against unauthorized access, improper use, alteration, or disruption of service.
Phishing Website
A fraudulent site created to mimic a legitimate platform.
Dictionary Attack
Where an attacker uses a list of words, phrases, or commonly used passwords to attempt unauthorized access to a system.
Virus
A type of malware that self-replicates and infects other files or systems.
Brute Force Attacks
Where an attacker systematically tries all possible combinations of passwords in order to gain unauthorized access to a system.
Input Sanitation
The process of filtering and validating user input before using it in an application.
Network Security Audit