wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

What is a Dumpster Diving Attack?

profile
Shifa Khan
Sep 20, 2022
2 Likes
0 Discussions
272 Reads

A dumpster diving attack is a type of cyber attack made possible by searching through the victim’s trash. While you might be imagining a messy and filthy scenario where a person dives into a dumpster, the reality is less unsanitary. In a dumpster diving attack, threat actors could be in and out of the dumpster in a matter of minutes. But they may already have their hands on a box full of confidential documents, storage devices, and workstations.

 

What Data Can Dumpster Drivers Obtain?

You would be surprised at the amount of information about you, your life, or your company in your trash. Think about the last time you threw your credit card statement. Did you shred it? How about the medical laboratory result from your previous visit to the doctor?

Among the data that dumpster drivers can get from searching through your trash are:

  1. Phone numbers of family members, friends, customers, and business associates
  2. Access codes and passwords written on an innocent notepad
  3. Credit card and bank account numbers
  4. Blueprints of product designs
  5. Printed drafts of business plans
  6. Calendars and to-do lists for previous days
  7. CDs, DVDs, and other portable storage devices

Any of the above information can be used to gain access to your home or work network. Notepads that contain passwords and access codes are the most valuable. However, most of us have learned to discard these items without a thought for security.

 

How to Protect Yourself from Dumpster Diving Attacks

The success of dumpster diving attacks can be traced back to lack of security knowledge. If people knew how an attacker could use the data on a piece of paper, they wouldn’t throw it without shredding.

Therefore, the most effective way to protect yourself and your organization from dumpster diving attacks is education. Learn to distinguish between confidential and public records.

For organizations, including disposal management in your overall security policy could provide clear guidelines on how sensitive data from your trash can stay protected. For example, the policy may dictate that all papers should be shredded before disposal. Storage devices, on the other hand, have to be cleaned of all data.


Comments ()


Sign in

Read Next

Deadlock and Starvation

Blog banner

Getting into Anime

Blog banner

Networking 101: How to Build Meaningful Connections in College

Blog banner

Mumbaicha Dabbawalla

Blog banner

Security issues

Blog banner

URL vs Domain

Blog banner

Apache Spark :- Powerful Data Processing Tool

Blog banner

objectives and functions of operating system

Blog banner

Virtual memory

Blog banner

Ethical Issues in Data Science and Role of Data Science in Smart Cities

Blog banner

SESSION HIJACKING

Blog banner

Deadlock

Blog banner

Deadlock

Blog banner

Shoulders

Blog banner

5 Stages of Digital Marketing

Blog banner

Service transition principles

Blog banner

The Real Reason Patola Outfits Come at a Premium Cost

Blog banner

I/O Buffering

Blog banner

SmartData Collective: Data Science aur Analytics ki Duniya

Blog banner

Android Flashlight Application

Blog banner

5 Things I As A Dentist Would Never Do (And What You Can Learn From It)

Blog banner

Risk mitigation and management

Blog banner

HUBSPOT

Blog banner

IT RISK

Blog banner

Importance of Network Security Risk

Blog banner

Hacking

Blog banner

Child labour

Blog banner

Is it important to follow all the trends that come up on social media?

Blog banner

A MODERN OPERATING SYSTEM

Blog banner

Logical and physical address

Blog banner

Service design process in ITSM

Blog banner

Privacy-Enhancing Computation Techniques

Blog banner

Busted : Common Web Security Myths

Blog banner

Types of Malware in Cyber Security

Blog banner

My First Trek - Sondai, Karjat - Shoaib Malik

Blog banner

Mumbai Metro 3

Blog banner

Virtual machine

Blog banner

How to lose belly fat

Blog banner

Quality check in IT services

Blog banner

Functions of Operating System

Blog banner

E-learning

Blog banner

Virtual memory

Blog banner