From ac924c09af676ec95d94f04d6ca743ed5b5c1bde Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Jes=C3=BAs=20Enrique=20Alcal=C3=A1=20Rojas?= Date: Mon, 12 Aug 2024 18:32:01 -0400 Subject: [PATCH] Add content for dumpster diving (#6514) * add content dumpster-diving@Iu0Qtk13RjrhHpSlm0uyh.md * Update src/data/roadmaps/cyber-security/content/dumpster-diving@Iu0Qtk13RjrhHpSlm0uyh.md * Update src/data/roadmaps/cyber-security/content/dumpster-diving@Iu0Qtk13RjrhHpSlm0uyh.md --------- Co-authored-by: Kamran Ahmed --- .../content/dumpster-diving@Iu0Qtk13RjrhHpSlm0uyh.md | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/src/data/roadmaps/cyber-security/content/dumpster-diving@Iu0Qtk13RjrhHpSlm0uyh.md b/src/data/roadmaps/cyber-security/content/dumpster-diving@Iu0Qtk13RjrhHpSlm0uyh.md index e69de29bb..b73b32b9e 100644 --- a/src/data/roadmaps/cyber-security/content/dumpster-diving@Iu0Qtk13RjrhHpSlm0uyh.md +++ b/src/data/roadmaps/cyber-security/content/dumpster-diving@Iu0Qtk13RjrhHpSlm0uyh.md @@ -0,0 +1,7 @@ +# Dumpster Diving + +Dumpster Diving in the context of cybersecurity refers to the practice of searching through discarded materials in trash or recycling bins to find confidential information. This technique may seem unsophisticated, but it can be extremely effective in obtaining valuable data such as passwords, account information, network diagrams, or any other sensitive information that has not been properly destroyed. + +Visit the following resources to learn more: + +- [@article@What is Dumpster Diving](https://powerdmarc.com/dumpster-diving-in-cybersecurity/)