DUMPSTER DIVING FOR DISCARDED MATERIALS: A SECURITY CONCERN
DOI:
https://doi.org/10.52417/njls.v3i1.102Keywords:
Dumpster, Trashcan, Attack, User practices, Sensitive InformationAbstract
As the notion of the paperless office gain popularity, increasingly data is being inputted, appraised and transferred to the required destination within split seconds. Sometimes this information are printed on documents or stored in electronic devices. When these materials are no longer needed they are dumped in trashcans which continue to attract dumpster divers and form hazards in the environment. The exposures of the contents of some trashcans debris are classified information on paper or disks. Sometimes dumpster divers dig through garbage cans in search of these classified materials. When such sensitive information is in the custody of an identity attacker, the resultant harm can be devastating. This paper discusses a form of computer attack known as dumpster diving. It analyzes dumpster divers‘ profile, motivation for divers and types of dumpster diving attacks. Recommendations are proffered that addresses vulnerable users‘ practices that reduces the success level of dumpsters
Published
Issue
Section
License
Copyright (c) 2013 https://unibenlsj.org.ng/index.php/njls/

This work is licensed under a Creative Commons Attribution 4.0 International License.