COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Sifting through garbage cans for credit card information, social security numbers or other personal information.
A
Virus
B
Trojan Horse
C
Botnet
D
Smishing
E
Dumpster Diving
Explanation: 

Detailed explanation-1: -In the world of information technology (IT), dumpster diving is a technique used to retrieve information that could be used to carry out an attack or gain access to a computer network from disposed items.

Detailed explanation-2: -A dumpster diving attack is a cyber attack that entails threat actors to search through a victim’s trash. Dumpster drivers can get the phone numbers of your family members, friends, customers, and business associates from your trash. They can also gain access to codes and passwords written on notepads.

Detailed explanation-3: -Dumpster divers locate financial statements, government records, medical bills, résumés, and the like simply through exploring the victim’s rubbish. Once in hand, the information is used to piece together identity profiles, making social engineering more likely to succeed.

Detailed explanation-4: -Never dump documents or other sensitive information in your trash. Identity thieves can use it with other illegal means to plan cyberattacks against your business. Statistics show that Americans receive more than 4 million spam emails every year, and more than 88% of the information was obtained via dumpster diving.

There is 1 question to complete.