Skip main navigation

Dumpster Diving Tactics and Examples

In this video Lisa Gilbert discusses Dumpster Diving attack examples, highlighting the red flags to look out for to prevent such attacks.
6.4
How do you recognise the potential for a dumpster diving attack? If potential attackers have ready access to discarded information, whether it be in the form of paper records, electronic information, or hardware or storage media that would contain valuable information, you’re at risk. There are several uses attackers could make of information obtained through dumpster diving. They could use any network or security information directly in a hacking attack. For example, if someone wrote down their new password in their organiser and then discarded it at the end of the year, attackers could use that to directly hack the network.
50
They could also use any personal information obtained to conduct many of the types of attacks we’ve already discussed, phishing, spear-phishing, whaling, smishing, or vishing. To avoid a dumpster diving attack, it’s critical to never underestimate the importance of physical security, even for your trash. Make sure to destroy any CDs or DVDs containing anyone’s personal data. When you decommission a computer, be sure to delete all the data. You should make sure you have a firewall in place so attackers can’t access any of your data, including discarded data. You should permanently destroy or use a cross-cut shredder to shred all paper documents.
94.4
I just cleaned out our personal files, and since we have a wood stove for heat, we threw all the documents containing personal information into the fire. Nobody’s going to get access to that. Make sure you have a policy for safe disposal and your waste bins are secured in some way. In conclusion, you’ve learned what dumpster diving is, what objectives attackers are aiming for in dumpster diving, and who is at risk for attacks. We discussed clues indicating a dumpster diving attack, as well as what you can do to protect yourself from an attack. In the next video, we will discuss tailgating, a social engineering attack that gives bad actors physical access to your facility. I’ll see you there.

In this video, different dumpster diving attack examples are discussed, highlighting the red flags to look out for to prevent such attacks.

This article is from the free online

Cyber Security Foundations: Common Malware Attacks and Defense Strategies

Created by
FutureLearn - Learning For Life

Our purpose is to transform access to education.

We offer a diverse selection of courses from leading universities and cultural institutions from around the world. These are delivered one step at a time, and are accessible on mobile, tablet and desktop, so you can fit learning around your life.

We believe learning should be an enjoyable, social experience, so our courses offer the opportunity to discuss what you’re learning with others as you go, helping you make fresh discoveries and form new ideas.
You can unlock new opportunities with unlimited access to hundreds of online short courses for a year by subscribing to our Unlimited package. Build your knowledge with top universities and organisations.

Learn more about how FutureLearn is transforming access to education