Dumpster-Diving Attack: Difference between revisions
Fix typo |
Tags: Mobile edit Mobile web edit |
||
Line 4: | Line 4: | ||
==How it works== | ==How it works== | ||
Due to how most storage devices work, files that are deleted by the user are not immediately deleted; instead, they are marked as available to be overwritten. | Due to how most storage devices work, files that are deleted by the user are not immediately deleted; instead, they are marked as available to be overwritten.<ref> https://www.howtogeek.com/125521/htg-explains-why-deleted-files-can-be-recovered-and-how-you-can-prevent-it/</ref> This allows deleted files on disposed storage devices to be recovered using data recovery tools. | ||
This attack is not limited to storage devices; paper records can also be used to extract sensitive information. | This attack is not limited to storage devices; paper records can also be used to extract sensitive information. |