COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK SECURITY AND CYBERSECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Virus
|
|
Trojan Horse
|
|
Botnet
|
|
Smishing
|
|
Dumpster Diving
|
Detailed explanation-1: -In the world of information technology (IT), dumpster diving is a technique used to retrieve information that could be used to carry out an attack or gain access to a computer network from disposed items.
Detailed explanation-2: -A dumpster diving attack is a cyber attack that entails threat actors to search through a victim’s trash. Dumpster drivers can get the phone numbers of your family members, friends, customers, and business associates from your trash. They can also gain access to codes and passwords written on notepads.
Detailed explanation-3: -Dumpster divers locate financial statements, government records, medical bills, résumés, and the like simply through exploring the victim’s rubbish. Once in hand, the information is used to piece together identity profiles, making social engineering more likely to succeed.
Detailed explanation-4: -Never dump documents or other sensitive information in your trash. Identity thieves can use it with other illegal means to plan cyberattacks against your business. Statistics show that Americans receive more than 4 million spam emails every year, and more than 88% of the information was obtained via dumpster diving.