Dumpster diving, or trashing, is a name given to a type of security attack by scavenging through materials that have been thrown away for any information that can help crack a system.
Around the offices and in the trash, crackers can find used disks and tapes, discarded printouts, and handwritten notes of all kinds. They may also retrieve printouts, computer manuals, and other documents from which they extract information needed to crack the system. In the system itself are files that have been deleted, but that haven't actually been erased from the system.
Kavungya answered the question on May 17, 2019 at 09:46
- What is Wiretapping?(Solved)
What is Wiretapping?
Date posted: May 17, 2019. Answers (1)
- What is Eavesdropping on Emanations?(Solved)
What is Eavesdropping on Emanations?
Date posted: May 17, 2019. Answers (1)
- Describe Denial or Degradation of Service.(Solved)
Describe Denial or Degradation of Service.
Date posted: May 17, 2019. Answers (1)
- Define Masquerading.(Solved)
Define Masquerading.
Date posted: May 17, 2019. Answers (1)
- Define software piracy.(Solved)
Define software piracy.
Date posted: May 17, 2019. Answers (1)
- What is Traffic Analysis?(Solved)
What is Traffic Analysis?
Date posted: May 17, 2019. Answers (1)
- Describe Trap Doors.(Solved)
Describe Trap Doors.
Date posted: May 17, 2019. Answers (1)
- Define Botnets.(Solved)
Define Botnets.
Date posted: May 17, 2019. Answers (1)
- Define a Ransomware.(Solved)
Define a Ransomware.
Date posted: May 17, 2019. Answers (1)
- Define Salamis.(Solved)
Define Salamis.
Date posted: May 17, 2019. Answers (1)
- Describe Logic Bombs.(Solved)
Describe Logic Bombs.
Date posted: May 17, 2019. Answers (1)
- What is Data Diddling?(Solved)
What is Data Diddling?
Date posted: May 17, 2019. Answers (1)
- Define IP Spoofing.(Solved)
Define IP Spoofing.
Date posted: May 17, 2019. Answers (1)
- Describe Password Sniffing.(Solved)
Describe Password Sniffing.
Date posted: May 17, 2019. Answers (1)
- Define Rootkits.(Solved)
Define Rootkits.
Date posted: May 17, 2019. Answers (1)
- Define Keyloggers.(Solved)
Define Keyloggers.
Date posted: May 17, 2019. Answers (1)
- Excess Privileges.(Solved)
Excess Privileges.
Date posted: May 17, 2019. Answers (1)
- Define a Zero Day Attack.(Solved)
Define a Zero Day Attack.
Date posted: May 17, 2019. Answers (1)
- Describe social engineering.(Solved)
Describe social engineering.
Date posted: May 17, 2019. Answers (1)
- What is Pharming?(Solved)
What is Pharming?
Date posted: May 17, 2019. Answers (1)