DUMPSTER DIVING FOR DISCARDED MATERIALS: A SECURITY CONCERN

Authors

  • A. O. EGWALI
  • V. V. N. AKWUKWUMA

DOI:

https://doi.org/10.52417/njls.v3i1.102

Keywords:

Dumpster, Trashcan, Attack, User practices, Sensitive Information

Abstract

As the notion of the paperless office gain popularity, increasingly data is being inputted, appraised and transferred to the required destination within split seconds. Sometimes this information are printed on documents or stored in electronic devices. When these materials are no longer needed they are dumped in trashcans which continue to attract dumpster divers and form hazards in the environment. The exposures of the contents of some trashcans debris are classified information on paper or disks. Sometimes dumpster divers dig through garbage cans in search of these classified materials. When such sensitive information is in the custody of an identity attacker, the resultant harm can be devastating. This paper discusses a form of computer attack known as dumpster diving. It analyzes dumpster divers‘ profile, motivation for divers and types of dumpster diving attacks. Recommendations are proffered that addresses vulnerable users‘ practices that reduces the success level of dumpsters

Published

2013-03-01

Issue

Section

Articles