wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

What is a Dumpster Diving Attack?

profile
Shifa Khan
Sep 20, 2022
2 Likes
0 Discussions
271 Reads

A dumpster diving attack is a type of cyber attack made possible by searching through the victim’s trash. While you might be imagining a messy and filthy scenario where a person dives into a dumpster, the reality is less unsanitary. In a dumpster diving attack, threat actors could be in and out of the dumpster in a matter of minutes. But they may already have their hands on a box full of confidential documents, storage devices, and workstations.

 

What Data Can Dumpster Drivers Obtain?

You would be surprised at the amount of information about you, your life, or your company in your trash. Think about the last time you threw your credit card statement. Did you shred it? How about the medical laboratory result from your previous visit to the doctor?

Among the data that dumpster drivers can get from searching through your trash are:

  1. Phone numbers of family members, friends, customers, and business associates
  2. Access codes and passwords written on an innocent notepad
  3. Credit card and bank account numbers
  4. Blueprints of product designs
  5. Printed drafts of business plans
  6. Calendars and to-do lists for previous days
  7. CDs, DVDs, and other portable storage devices

Any of the above information can be used to gain access to your home or work network. Notepads that contain passwords and access codes are the most valuable. However, most of us have learned to discard these items without a thought for security.

 

How to Protect Yourself from Dumpster Diving Attacks

The success of dumpster diving attacks can be traced back to lack of security knowledge. If people knew how an attacker could use the data on a piece of paper, they wouldn’t throw it without shredding.

Therefore, the most effective way to protect yourself and your organization from dumpster diving attacks is education. Learn to distinguish between confidential and public records.

For organizations, including disposal management in your overall security policy could provide clear guidelines on how sensitive data from your trash can stay protected. For example, the policy may dictate that all papers should be shredded before disposal. Storage devices, on the other hand, have to be cleaned of all data.


Comments ()


Sign in

Read Next

Embracing the power of Modern Machine UNIX

Blog banner

Cyber Bullying - Neeta Vonkamuti

Blog banner

Routers

Blog banner

Blog on Smartsheet.

Blog banner

Anomaly Detection in Behavioral Data Using Machine Learning

Blog banner

Modern OS

Blog banner

LinkedIn

Blog banner

Direct Memory Access

Blog banner

Service Transition Process in ITSM

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

MPL and how its effects?

Blog banner

Music

Blog banner

The New Dr. Frankenstein who will perform first full head transplant

Blog banner

Biometric Authentication Vulnerabilities

Blog banner

Vulnerability Assessment

Blog banner

Junk food vs healthy food

Blog banner

Different memory allocation strategies

Blog banner

Binary Search Tree (BST) in Data Structure

Blog banner

SQL Injection

Blog banner

What is metaverse?

Blog banner

Operating system

Blog banner

ART AND CULTURE OF VRINDAVAN

Blog banner

Study of Backdoor and Trojan tools

Blog banner

World’s rarest passport owned by 500 people.

Blog banner

Meal Maharaj — 3 CP, 5 CP, 8 CP. Same Love, Different Portions

Blog banner

Exploring the Power of Encase Forensic Tools: Unraveling Digital Mysteries

Blog banner

Improving the Accuracy of GPS and GNSS

Blog banner

Memory management

Blog banner

The Role of Frontline Managers in Driving Workplace Performance and Customer Satisfaction

Blog banner

Process Description

Blog banner

LEMON PICKLE SWEET AND MILD HOT

Blog banner

Environmental Management using GIS

Blog banner

What is time ? The term which has astonished Scientists

Blog banner

Delhi city

Blog banner

Clarizen

Blog banner

Service Strategy In ITSM

Blog banner

The War With Cold On Earth

Blog banner

Operation system

Blog banner

Blog on health and fitness

Blog banner

IT service level agreement

Blog banner

Different types of e-commerce platforms or advantages and disadvantages

Blog banner

Smartsheet

Blog banner