Do you know your virus from your elbow?


When you run a small company, you’re the boss, the sales manager, the cleaner, and – yes – the IT manager too. So for the protection of your precious information, you need to get to grips with internet security. Take our fun quiz to test your knowledge, and in the process find out what some of those strange terms you keep on hearing actually mean.

Think of it as “Call My Bluff” for 2010. The correct answers are listed below!

Java is...

  1. A type of virus, named after the country where it was first created
  2. A programming language which makes internet pages more useful
  3. A particularly nice blend of coffee

Spyware is...

  1. An antivirus program which keeps an eye on your computer
  2. A type of virus which sneaks a peek at the things you do on your computer
  3. A clothing range for secret agents

A Worm is...

  1. A virus, so called because it wriggles into your computer unannounced
  2. A program which stretches the capacity of your hard drive, letting you save more data
  3. Short for “Work-Oriented Reference Machine”, one of the first computers

ActiveX is...

  1. A fitness club
  2. A way of embedding practical programs into web pages
  3. A virus which corrupts software installed on your computer

A Cookie is...

  1. A way of passing and storing useful information between your computer and a website
  2. A sweet treat
  3. A virus, so called because it “crumbles” your data

A Back Door is...

  1. A way into your system left by a programmer or a virus attack
  2. A second way to unlock trial software so that you don’t have to pay for it
  3. A nice place to sit on a warm evening

A Domain Name Server is...

  1. A computer which translates complicated numbers into legible web addresses
  2. A computer which hunts the internet for personal details with which to defraud you
  3. A computer which broadcasts your business information to help promote your website

Spam is...

  1. A processed meat product which doesn’t belong in the modern kitchen
  2. Unwanted email, often sent by unscrupulous criminals
  3. A crashed computer; named after the noise made by a computer gently collapsing

A Hacker is...

  1. A cyber-criminal; a bad computer expert
  2. A mark left on your computer after a malicious attack, by which the attack can be traced
  3. A nasty cough

A Key Logger is...

  1. A program which stores attempts to access a computer, so you can tell who has logged in
  2. The most important man in a timber yard
  3. A program which records what you type, allowing criminals to learn passwords etc.

Denial of Service is...

  1. A defence by which your anti-virus software prevents unauthorised programs from running
  2. A protective measure by which your internet service automatically disconnects
  3. A type of attack in which your web server is assaulted with too much data until it shuts down

A Patch is...

  1. A piece of official software which closes a loophole in existing programs to keep hackers out
  2. A piece of illegal software used by criminals to expose vulnerabilities in your software
  3. A section of the memory in your computer used to store personal information

Phishing is...

  1. What phriends do on phriday aphternoons
  2. Using fake websites and emails to draw personal information out of unsuspecting people
  3. A technique based on wi-fi signals used by the police to trap cyber-criminals

A RAID is...

  1. A type of hard drive with enhanced backup and security mechanisms
  2. A carefully orchestrated attack by multiple hackers at the same time
  3. A metal security cage used to house expensive computer equipment

A Trojan is...

  1. An anti-virus program, so called because it works so hard
  2. A type of virus, so called because it appears innocuous and harmless at first
  3. An IT expert who is specialist in handling virus emergencies

And the answers are...

Java is 2, a programming language which makes internet pages more useful (although it’s a nice brew of coffee, too). You have nothing to fear from Java updates, java-based programs or Javascript – but for security purposes, do be sure to keep Java updated to the latest version.

Spyware is 2, a type of virus which sneaks a peek at the things you do on your computer. Once it’s installed, it will look out for interesting information like credit card details or confidential data. Fight back with regular complete scans of your system with anti-virus software.

A Worm is 1, a virus, so called because it wriggles into your computer unannounced. To continue the analogy, worms are very much your “common or garden” virus.

ActiveX is 2, a way of embedding practical programs into web pages (rather like Java). It’s nothing to be scared of, but you should trust the page in which you find ActiveX before allowing it to run.

A Cookie is 1, a way of passing and storing useful information between your computer and a website – and nothing to be worried about. If you go to a website and select “Remember me on this computer” so you don’t have to log in next time, that’s cookies in action. Make sure your system is protected, though – cookies not surprisingly contain personal information like passwords.

A Back Door is 1, a way into your system left by a programmer or a virus attack. There’s not much you can do about this sort of threat, other than installing only software you trust, and keeping your computer and anti-virus well patched.

A Domain Name Server is 1, a computer which translates complicated numbers into legible web addresses. When you type www.microsoft.com into your browser, it’s a domain name server (or “DNS” if you want to show off…) which translates this human address into the set of numbers which computers can understand. Complicated, but not a security threat.

Spam is 2, unwanted email, often sent by unscrupulous criminals. If you have an Inbox full of offers to transfer several million pounds into your bank account, or a range of interesting pharmaceuticals, that’s spam.

A Hacker is 1, a cyber-criminal; a bad computer expert. They’re the people who, for mere malice or good old-fashioned fraud, try to compromise your computer systems.

A Key Logger is 3, a program which records what you type, allowing criminals to learn passwords etc. If a key logger finds its way onto your computer, someone else will see everything which you type: including passwords, credit card details etc. Nasty. As ever, though, keep your anti-virus service up-to-date and all should be well.

Denial of Service is 3, a type of attack in which your web server is assaulted with too much data until it shuts down. This sort of attack is usually reserved for large companies, especially ones with e-commerce websites. The attacker bombards the website with useless data, preventing proper business from being conducted.

A Patch is 1, a piece of official software which closes a loophole in existing programs to keep hackers out. Patches are good; they come from reputable companies, and you should keep your software patched at all times. Like a bicycle tyre, unpatched software won’t get you far!

Phishing is 2, using fake websites and emails to draw personal information out of unsuspecting people. If you’re sent an email (or click a link to a website) which purports to be from a reputable company, don’t enter any personal information until you’re sure the site is genuine; rather than a well-crafted but entirely criminal copy.

A RAID is 1, a type of hard drive with enhanced backup and security mechanisms. RAID drives protect your data far more effectively than ordinary drives (and these days they don’t cost too much, either).

A Trojan is 2, a type of virus, so called because it appears innocuous and harmless at first. Like worms, bots and all sorts of other nasties, we want Trojans out, and out fast. Keep your system protected with the best anti-virus you can find.

Now that you’re a security expert; get the best protection you can, completely free of charge! Check out Microsoft Security Essentials at http://www.microsoft.com/security_essentials/

 

Comments (3)

  1. Trevor Northrop says:

    Very basic stuff, if you got just one anwser wrong time to get studying on basic computer speak…..!

  2. Alex Haigh says:

    Is ANYONE daft enough to get any of these wrong? There's a couple of gems in the really daft suggestions though – I rather like the concept of a Key Logger…

  3. Telecommunications network engineer job description says:

    Made me laugh! the answers were great..thanks..Hope you share this with face book!

    <a href="http://www.samplejobdescriptions.org/telecommunications-network-engineer-job-description.html">Telecommunications network engineer job description

    </a>

Skip to main content