What Is The Name Of The Policy Outlining Procedures To Combat Dumpster Diving?
What Is The Name Of The Policy Outlining Procedures To Combat Dumpster Diving?
Share
Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.
Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
What Is the Name of The Policy Outlining Procedures to Combat Dumpster Diving?
Answer:
The name of the policy that outlines the procedures for dealing with waste diving is Disposal and Destruction.
Dumpster diving:
It is a technique that is used to recover all the information that is used to attack a computer network from predisposed items. It is hunting information from other’s trash. It is a widespread technique that is not only limited to hurting someone else information’s, passwords and entrance codes, phone information. The social engineering technique is used by an attacker to obtain entrance to the network.
Disposal policy:
Dumpster diving can be prevented from learning something important from trash the recommended policy is disposal policy in which before recycling all the papers and printout are shredded in a machine, it ensures all the data is deleted from media storage. Provide awareness to the staff about the peril of unhandled trash.
From media storage information is recovered the hardware of the disposed of computer is a jackpot for attackers. The improperly erased drives easily recovered contain important certificates and passwords. With the help of new technology without storage, media tools are available like trusted platform module data sworn by a company. Attackers also can identify the manufacturing of equipment by using hardware.
Steps Prevention from dumpster diving:
Through processes, the attack from dumpster diving can be prevented this should be clearly explained to the employees. A lot of care is needed to handle trash properly.
Convenient shredding: Provides access to employees for shredding that are placed next to recycling bins. Home shredders are provided to those employees who work from home.
Awareness:
It is necessary to educate employees about social engineering methods and proper disposal. To use old computers and to take the printout to homes are not allowed to the employees.
Locked trash:
To prevent dumpster diving Tash should be locked and secure till it is not ready to pick up.
Secure storage media:
It includes shredding compact discs, disk drives erasers, and demagnetize storage.