wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

What is a Dumpster Diving Attack?

profile
Shifa Khan
Sep 20, 2022
2 Likes
0 Discussions
271 Reads

A dumpster diving attack is a type of cyber attack made possible by searching through the victim’s trash. While you might be imagining a messy and filthy scenario where a person dives into a dumpster, the reality is less unsanitary. In a dumpster diving attack, threat actors could be in and out of the dumpster in a matter of minutes. But they may already have their hands on a box full of confidential documents, storage devices, and workstations.

 

What Data Can Dumpster Drivers Obtain?

You would be surprised at the amount of information about you, your life, or your company in your trash. Think about the last time you threw your credit card statement. Did you shred it? How about the medical laboratory result from your previous visit to the doctor?

Among the data that dumpster drivers can get from searching through your trash are:

  1. Phone numbers of family members, friends, customers, and business associates
  2. Access codes and passwords written on an innocent notepad
  3. Credit card and bank account numbers
  4. Blueprints of product designs
  5. Printed drafts of business plans
  6. Calendars and to-do lists for previous days
  7. CDs, DVDs, and other portable storage devices

Any of the above information can be used to gain access to your home or work network. Notepads that contain passwords and access codes are the most valuable. However, most of us have learned to discard these items without a thought for security.

 

How to Protect Yourself from Dumpster Diving Attacks

The success of dumpster diving attacks can be traced back to lack of security knowledge. If people knew how an attacker could use the data on a piece of paper, they wouldn’t throw it without shredding.

Therefore, the most effective way to protect yourself and your organization from dumpster diving attacks is education. Learn to distinguish between confidential and public records.

For organizations, including disposal management in your overall security policy could provide clear guidelines on how sensitive data from your trash can stay protected. For example, the policy may dictate that all papers should be shredded before disposal. Storage devices, on the other hand, have to be cleaned of all data.


Comments ()


Sign in

Read Next

Hash password! Is it really secured?

Blog banner

Cloud Computing: Threats and Vulnerabilities

Blog banner

Deadlock and Starvation

Blog banner

Dr. Venkadavarahan

Blog banner

ITIL Version 3 and 4 differenciation?

Blog banner

New Horizon Europe project ‘EvoLand’ sets off to develop new prototype services.

Blog banner

Save Environment

Blog banner

Operating System Objectives and Functions

Blog banner

ODOO

Blog banner

THE ACTORS LIFE

Blog banner

Memory Management

Blog banner

What does the Australian summer have in store for your oral health?

Blog banner

Memory Management Techniques

Blog banner

Steps to create an Ubuntu EC2 Instance with GUI in AWS

Blog banner

RAID

Blog banner

Sage business cloud accounting

Blog banner

AI and cyber Security

Blog banner

Starvation

Blog banner

The functions of operating system

Blog banner

Know your Processors!

Blog banner

Message Passing in OS

Blog banner

The Memory Hierarchy

Blog banner

security controls

Blog banner

E-BUSINESS RISK MANAGEMENT

Blog banner

Honeypot in cyber security

Blog banner

Some web vulnerabilities

Blog banner

Anomaly Detection in Behavioral Data Using Machine Learning

Blog banner

DIGITAL TECHNOLOGY

Blog banner

Security issues

Blog banner

10 Unknown facts about India's Independence

Blog banner

Memory Management

Blog banner

"The Benefits of Using GIS in Agriculture"

Blog banner

10 Signs your Computer has Virus

Blog banner

How Men and Women Process Pain Differently

Blog banner

GEOLOGY AND GEO-TECTONIC FRAME WORK OF WESTERN BASTAR CRATON

Blog banner

Memory Hierarchy

Blog banner

Music is life

Blog banner

Article on Zoho Corporation

Blog banner

Objectives and functions of Operating System...

Blog banner

My Favorite Country

Blog banner

JIRA SOFTWARE

Blog banner

Famous Indian dishes that where misunderstood to be Indian

Blog banner