Define Spoofing, Give an Example
Pretending to be something/someone you are not.
Ex: Pretending to be a security guard to get into a bank.
Is throwing non confidential material in the bin ok?
Yes
What is Google Dorking
Google Hacking
What does Vulnerability Management mean?
Finding and fixing system weakness
How old is Cindy?
She doesn't look a day over 20!
True or False,
Finding someone's key to get into the building is an example of tampering.
False
Is letting a close coworker piggyback ok?
No
What does a green light on your camera on without you accessing it mean?
It means you got hacked boiiiiiiiiiiiiiiii
How long should it take to patch critical vulnerabilities?
Name Cindy's dogs
Tyson & Daisy
Is using a keycard a form of repudiation or non repudiation?
Non Repudiation
Is it ok to take company info home?
Not without authorization
What do you use to find illegal MP3's online? (ex. Beyoncé)
intitle: index pf MP3 intitle: Beyonce
What are the five steps of Vulnerability Management?
Scope
Prioritize
Scan
Remediate
Test
What are the three rotations the GirlsGetIT take part in?
HIVE/DSC
IT Security/ITI
If you click on a link and the web page doesn't pop up you are most likely getting hacked through which part of S.T.R.I.D.E.
Denial of Service
Sally took a selfie in her office, she posted it on social media, but there was confidential information and she didn't notice, should she take down the post?
Yes
Give an example of a Google Dorking tag
intitle:
filetype:Qualys
How many Kevins are on both the buildings? (only the ones we met)
4
Name all the terms
S-Spoofing
T-Tampering
R-Repudiation
I-Information Disclosure
D-Denial of Service
E-Elevation of Privilege
What is required for a strong password?
More than 8 characters
Capitalize
Lower case
Special number/character
What operating system is most commonly used for hacking?
Linux
What are the four levels of information classification?
Secret
Confidential
Internal
Public
Who runs the GirlsGetIT Program?
Afia, Cindy, and Sara