Image: Martin Poole/Stockbyte/Getty Images
About This QuizYes, computers can make life easier, but they also can put your private information at risk. Find out how much you know -- or don't know -- about computer security by taking our quiz.
What is the process of encoding information in a way so that only someone with a key can decode it?
Encryption refers to the practice of encoding data so that only someone with the right key can read it. Clever code breakers can sometimes crack encrypted messages, requiring security experts to devise more complex encryption algorithms.
In computer security terms, what is a hash?
A delicious way to cook potatoes
An encrypted value
A hash or hash value is a string of characters that represent encrypted data. You create a hash value by running data through a hashing algorithm.
A decryption key
What does SSL stand for?
Secure Sockets Layer
SSL stands for Secure Sockets Layer, a form of public key encryption.
Secret Service Logarithm
Systematic Security Level
What is a firewall?
Software that logs Internet activity
A filter for an Internet connection
A firewall acts as a filter for an Internet connection. It monitors incoming data and blocks certain data packets.
What is a proxy server?
A server that retrieves data from host servers before sending it to a computer
Proxy servers act as middlemen for the Internet. They retrieve Web pages and send them to computers, which means the computer in question never has to deal with the server hosting the Web page directly.
A virtual server that can behave like a mail server, Web server or FTP server
A waiter who never seems to be in the restaurant when your water glass is empty
What is another term for a zombie computer army?
A botnet is a network of computers that have transformed into bots -- devices under the control of a third party.
What does DDoS stand for?
Dangerous DOS open Security
Digital Default of Servers
Distributed Denial of Service
A Distributed Denial of Service attack uses computers to send millions of message requests to a server with the goal of overwhelming and crashing the server. A large DDoS attack can affect global Internet traffic.
Which kind of malware typically resides in a larger, innocent computer program?
Traditionally, a computer virus is a line of code or a function within a larger computer program. While not all computer viruses are harmful, the most famous ones can cause a lot of damage.
What is phishing?
A decryption method that uses complex algorithms
A method of online identity theft
Phishing refers to a technique designed to fool innocent people into sharing private information like bank account numbers and credit card information.
A way to send spam mail to millions of people at once
What's another name for crackers -- malicious hackers who infiltrate secure systems in order to steal information or cause damage?
A black hat hacker is someone who actively attempts to infiltrate secure systems or build computer viruses with the intent to cause mischief or steal information.
Martin Poole/Stockbyte/Getty Images