词条 | Information diving |
释义 |
In earlier times, the available discarded data included printed manuals and design records. In a famous case, a student, Jerry Schneider, discovered some discarded manuals for a telephone system ordering / shipping system and was able to build a business selling 'surplus' gear ordered from the telephone company as though for an internal company department. Today, files, letters, memos, photographs, IDs, passwords, credit cards, and more can be found in dumpsters. Many people do not consider that sensitive information on items they discarded may be recovered. Such information, when recovered, is sometimes usable for fraudulent purposes (see also "identity theft" and physical information security) Two MIT students purchased a large number of obsolete computers at yard sales and the like and found everything from credit card information to tax return data. They published a paper, Remembrance of Things Past, documenting their discoveries.[4] Supposedly, information diving was more common in the 1980s due to lax security; when businesses became aware of the need for increased security in the early 1990s, sensitive documents were shredded before being placed in dumpsters. There is still considerable Internet activity on the subject of dumpster diving, so it is unlikely to have stopped with the widespread introduction of document shredding. Security mythology has it that curious hackers or malicious crackers commonly use this technique. Dumpster diving is commonly practiced by "watchdog" organizations seeking information on groups they are investigating. The Trinity Foundation successfully used this technique to report on the activities of televangelist Robert Tilton, and has also obtained information on Benny Hinn using this practice.[5] It is also sometimes used by attorneys or their agents when seeking to enforce court-ordered money judgments: the judgment debtor's trash may contain information about assets that can then be more-readily located for levying.[6] See also
References1. ^binology - Oxford Reference {{computer-security-stub}}2. ^[https://www.theguardian.com/media/blog/2011/nov/29/leveson-inquiry-nick-davies-paul-mcmullan-live Leveson inquiry: Nick Davies, Paul McMullan and Richard Peppiatt appear - theguardian.com - 29 November 2011] 3. ^[https://www.theguardian.com/media/2011/dec/20/leveson-inquiry-piers-morgan-live Leveson inquiry: Piers Morgan gives evidence - theguardian.com - 20 December 2011] 4. ^{{cite news|last1=Garfinkel|first1=Simson|title=Remembrance of Things Past|url=http://www.technologyreview.com/article/400929/remembrance-of-things-past/|accessdate=16 August 2015|date=1 April 2001}} 5. ^{{cite news|title=Robert Tilton the greedy televangelist This MAn Rips Off Millions From Gullible Followers: The Desperate, Lonely, Forgotten, Afraid, Elderly, Religious and Others Fort Lauderdale Florida|url=https://www.ripoffreport.com/r/Robert-Tilton/Fort-Lauderdale-Florida/Robert-Tilton-the-greedy-televangelist-This-MAn-Rips-Off-Millions-From-Gullible-Followers-214007|accessdate=16 August 2015|date=3 October 2006}} 6. ^{{cite web|title=How To Dumpster Dive|url=http://www.judgmentbuy.com/HowToDumpsterDive.html|accessdate=16 August 2015}} 3 : Security|Carding (fraud)|Data security |
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。