wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

What is a Dumpster Diving Attack?

profile
Shifa Khan
Sep 20, 2022
2 Likes
0 Discussions
271 Reads

A dumpster diving attack is a type of cyber attack made possible by searching through the victim’s trash. While you might be imagining a messy and filthy scenario where a person dives into a dumpster, the reality is less unsanitary. In a dumpster diving attack, threat actors could be in and out of the dumpster in a matter of minutes. But they may already have their hands on a box full of confidential documents, storage devices, and workstations.

 

What Data Can Dumpster Drivers Obtain?

You would be surprised at the amount of information about you, your life, or your company in your trash. Think about the last time you threw your credit card statement. Did you shred it? How about the medical laboratory result from your previous visit to the doctor?

Among the data that dumpster drivers can get from searching through your trash are:

  1. Phone numbers of family members, friends, customers, and business associates
  2. Access codes and passwords written on an innocent notepad
  3. Credit card and bank account numbers
  4. Blueprints of product designs
  5. Printed drafts of business plans
  6. Calendars and to-do lists for previous days
  7. CDs, DVDs, and other portable storage devices

Any of the above information can be used to gain access to your home or work network. Notepads that contain passwords and access codes are the most valuable. However, most of us have learned to discard these items without a thought for security.

 

How to Protect Yourself from Dumpster Diving Attacks

The success of dumpster diving attacks can be traced back to lack of security knowledge. If people knew how an attacker could use the data on a piece of paper, they wouldn’t throw it without shredding.

Therefore, the most effective way to protect yourself and your organization from dumpster diving attacks is education. Learn to distinguish between confidential and public records.

For organizations, including disposal management in your overall security policy could provide clear guidelines on how sensitive data from your trash can stay protected. For example, the policy may dictate that all papers should be shredded before disposal. Storage devices, on the other hand, have to be cleaned of all data.


Comments ()


Sign in

Read Next

Importance of education

Blog banner

Some facts about Technology

Blog banner

Khau Galli – Vile Parle

Blog banner

Guidelines for a low sodium diet.

Blog banner

PERT Overview

Blog banner

What is Internet

Blog banner

E-Governance

Blog banner

5 Interesting facts about Diwali

Blog banner

INDIAN CHEAPEST COSMETICS BRAND

Blog banner

Instagram Features in 2023 That Will Leave You Stunned!

Blog banner

GIS Bharat Maps

Blog banner

Music

Blog banner

Computer security techniques

Blog banner

10 Interesting Facts about Attack on Titan

Blog banner

ONLINE NEWSROOMS

Blog banner

DATA VAULT

Blog banner

Practical Implementation of Client Server model using TCP/IP.

Blog banner

OS Assignment 3 Deadlock

Blog banner

Starvation and Deadlock.

Blog banner

Goa Trip With Friends

Blog banner

Cyber Forensics in Healthcare: Protecting Patient Data and Preventing Breaches

Blog banner

Ola

Blog banner

SEIZING DIGITL EVIDENCE AT THE SCENE

Blog banner

Image Steganography: Hiding Secrets in Plain Sight

Blog banner

Never give up

Blog banner

Webmail

Blog banner

Apache Kafka

Blog banner

Sagar Parikrama

Blog banner

Python as a tool for data analysis

Blog banner

Sensory Play for Toddlers: Boosting Curiosity Through Touch, Sound, and Colour

Blog banner

Recipe of Paneer Butter Masala

Blog banner

Types of Malware in Cyber Security

Blog banner

My favourite food

Blog banner

The Laws of Karma

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

Emailing the merger document

Blog banner

Constrains in service design

Blog banner

Firewall

Blog banner

Palm Vein Biometric Technology; Contactless vein authentication

Blog banner

Data Lakes: A Key to Modern Data Management

Blog banner

Article on Team Work

Blog banner

Malware Defense

Blog banner