Dumpster-Diving Attack: Difference between revisions

Fix typo
I'm not sure this article, at least in their current form, really relates to consumer protection? it seems much more like a general privacy/cybercrime issue
 
(One intermediate revision by one other user not shown)
Line 1: Line 1:
{{StubNotice}}
{{Irrelevant}}


A dumpster-diving attack is an attack where a malicious actor collects disposed-of sensitive data, commonly in the form of storage devices. The target of this type of attack can be a large business or an individual.
A dumpster-diving attack is an attack where a malicious actor collects disposed-of sensitive data, commonly in the form of storage devices. The target of this type of attack can be a large business or an individual.


==How it works==
==How it works==
Due to how most storage devices work, files that are deleted by the user are not immediately deleted; instead, they are marked as available to be overwritten.{{CitationNeeded}} This allows deleted files on disposed storage devices to be recovered using data recovery tools.
Due to how most storage devices work, files that are deleted by the user are not immediately deleted; instead, they are marked as available to be overwritten.<ref> https://www.howtogeek.com/125521/htg-explains-why-deleted-files-can-be-recovered-and-how-you-can-prevent-it/</ref> This allows deleted files on disposed storage devices to be recovered using data recovery tools.


This attack is not limited to storage devices; paper records can also be used to extract sensitive information.
This attack is not limited to storage devices; paper records can also be used to extract sensitive information.