There is a famous saying that most of you might have listened, “One man’s trash is another man’s treasure”. That means what one person considers worthless might be of high value to the other. The concept of Dumpster Diving relies upon the above stated idiom.
In the world of Information Security and Cyber threats, Dumpster diving is the process of searching trash to obtain useful information about a person/business that can later be used for the hacking purpose. This attack mostly targets large organizations or business to carry out phishing (mostly) by sending fake emails to the victims that appear to have come from a legitimate source. The information obtained by compromising the confidentiality of the victim is used for Identity frauds.
What does a hacker look for?
- Email address/address
- Phone numbers to carry out Vishing
- Passwords and other social security numbers that we might have written on sticky notes for our convenience
- Bank statements/financial statements
- Medical records
- Important documents
- Account login credentials
- Business secrets
- Marketing secrets
- Information of the employee base
- Information about the software/tools/technologies that is being used at the company
- Destroy any CDs/DVDs containing personal data.
- In case you no longer need your PC, make sure you have deleted all the data so that it can’t be recovered.
- Use of firewalls can prevent suspicious Internet users from accessing the discarded data.
- Paper documents should be permanently destroyed/shredded.
- Companies should lock waste bins and should have a safe disposal policy.
We can take several effective steps to ensure our safety. But the most important step in the process of ensuring safety still remains the same. And it is to spread awareness among your known ones. Perhaps, this is the best thing we can do to mark us safe in this flood of threats. Stay safe.
Attention reader! Don’t stop learning now. Get hold of all the important DSA concepts with the DSA Self Paced Course at a student-friendly price and become industry ready.
- Top 10 Machine Learning Project Ideas That You Can Implement
- Top 5 Golang Frameworks in 2020
- Link Access Protocol D-channel (LAPD)
- Different types of CAPTCHAs
- How to Learn Python in 21 Days?
- Working of Dynamic Host Configuration Protocol
- X.25 Structure
- Switch Port Analyzer (SPAN)
- SMTP Responses
- Optimized Link State Routing Protocol
- Link Access Procedure, Balanced (LAPB) Frame Format
- Top 5 Cloud Platform Service Providers in 2020
- Link Access Procedure Balanced (LAPB) Frame Types
- Subscriber Identity Module (SIM)
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to email@example.com. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.