Describe Dumpster Diving.

      

Describe Dumpster Diving.

  

Answers


Kavungya
Potential Offenders
System users.
Anyone able to access the trash area.
Anyone who has access to computer areas or areas used to store backups.
Methods of Detection
Tracing proprietary information back to its source (e.g., memos with company names or logos).
Observation (guards may actually see intruders in action).
Testing an operating system to discover data left over after job execution.
Evidence
Computer output media (e.g., may contain vendor name or identifying page numbers).
Similar information produced in suspected ways in the same form.
Characteristics of printout or other media (e.g., type fonts or logos).
Kavungya answered the question on May 17, 2019 at 08:47


Next: Below are the bond dissociation energies of some elements.
Previous: Describe the ways of detecting Wiretapping and Eavesdropping.

View More Introduction to ICT Questions and Answers | Return to Questions Index


Exams With Marking Schemes

Related Questions