Browse Wiki & Semantic Web

Jump to: navigation, search
Http://dbpedia.org/resource/Information diving
  This page has no properties.
hide properties that link here 
  No properties link to this page.
 
http://dbpedia.org/resource/Information_diving
http://dbpedia.org/ontology/abstract El trashing o dumpster diving es una técniEl trashing o dumpster diving es una técnica que permite obtener y recopilar información privada. .​​Es empleada principalmente por crackers (también conocidos como hackers de sombrero negro)​​​​​y periodistas,​aunque también para investigación privada.​La información obtenida puede variar desde nombres de usuario y claves, información personal y otras formas de información sensible.​ Se lleva a cabo revisando y recuperando documentos y archivos ubicados en la basura de la persona u organización a investigar. Es un delito informático poco conocido que se fundamenta principalmente en la obtención de ficheros eliminados por el usuario, quien cree haberse deshecho de éstos.rio, quien cree haberse deshecho de éstos. , El trashing o dumpster diving és una tècniEl trashing o dumpster diving és una tècnica que permet obtenir i recopilar informació privada. .Es fa servir principalment per crackers (coneguts també com a hackers de barret negre) i periodistes,encara que també per a recerca privada.L'informació obtinguda pot variar des de noms d'usuari i claus, informació personal i altres formes d'informació sensible. Consisteix en revisar i recuperar documents i arxius ubicats a les escombraries de la persona o l'organització a investigar. És un delicte informàtic poc conegut que es fonamenta principalment en l'obtenció de fitxers eliminats per l'usuari, qui creu haver-se desfet d'aquests.suari, qui creu haver-se desfet d'aquests. , Il trashing (detto anche information divinIl trashing (detto anche information diving) è la pratica di risalire ad informazioni riservate attraverso il setacciamento dei rifiuti della vittima, come resoconti, bollette, corrispondenza.Ad esempio il truffatore può risalire ai dati di un titolare di carta di credito mediante gli scontrini di acquisto o gli estratti conto emessi durante i prelievi al Bancomat.Dal ritrovamento di scatole di medicinali nella pattumiera si può risalire o, quantomeno, intuire il tipo di malattia da cui la vittima è affetta. Nella sicurezza informatica il trashing è una delle tecniche utilizzate da hacker e cracker per reperire informazioni da utilizzare negli attacchi informatici. La distruzione certificata dei documenti rappresenta oggi una soluzione robusta al trashing.ta oggi una soluzione robusta al trashing. , Information diving is the practice of recoInformation diving is the practice of recovering technical data, sometimes confidential or secret, from discarded material. In recent times, this has chiefly been from data storage elements in discarded computers, most notably recoverable data remaining on hard drives. Those in charge of discarding computers usually neglect to erase the hard drive. It is often in such circumstances for an information diver to copy installed software (e.g., word processors, operating systems, computer games, etc.). Other data may also be available, such as credit card information that was stored on the machine. Companies claim to be especially careful with customer data, but the number of data breaches by any type of entity (e.g., education, health care, insurance, government, ...) suggest otherwise. In the UK, information diving has been referred to as "binology." Today, files, letters, memos, photographs, IDs, passwords, credit cards, and more can be found in dumpsters. Many people do not consider that sensitive information on items they discarded may be recovered. Such information, when recovered, is sometimes usable for fraudulent purposes (see also "identity theft" and physical information security). This method of dumpster diving is also sometimes used by attorneys or their agents when seeking to enforce court-ordered money judgments: the judgment debtor's trash may contain information about assets that can then be more-readily located for levying. Supposedly, information diving was more common in the 1980s due to lax security; when businesses became aware of the need for increased security in the early 1990s, sensitive documents were shredded before being placed in dumpsters. There is still considerable Internet activity on the subject of dumpster diving, so it is unlikely to have stopped with the widespread introduction of document shredding. Security mythology has it that curious hackers or malicious crackers commonly use this technique.ious crackers commonly use this technique.
http://dbpedia.org/ontology/wikiPageID 5362319
http://dbpedia.org/ontology/wikiPageLength 4731
http://dbpedia.org/ontology/wikiPageRevisionID 1047658973
http://dbpedia.org/ontology/wikiPageWikiLink http://dbpedia.org/resource/Physical_information_security + , http://dbpedia.org/resource/Credit_card + , http://dbpedia.org/resource/Benjamin_Pell + , http://dbpedia.org/resource/Identity_theft + , http://dbpedia.org/resource/Password + , http://dbpedia.org/resource/Benny_Hinn + , http://dbpedia.org/resource/Hacker_%28computer_security%29 + , http://dbpedia.org/resource/Dumpster_diving + , http://dbpedia.org/resource/Hard_drive + , http://dbpedia.org/resource/Jerry_Schneider + , http://dbpedia.org/resource/Judgment_debtor + , http://dbpedia.org/resource/Black_hat_hacking + , http://dbpedia.org/resource/Televangelist + , http://dbpedia.org/resource/Trinity_Foundation_%28Dallas%29 + , http://dbpedia.org/resource/Operating_systems + , http://dbpedia.org/resource/E-waste + , http://dbpedia.org/resource/Word_processor + , http://dbpedia.org/resource/Copyright_infringement_of_software + , http://dbpedia.org/resource/Robert_Tilton + , http://dbpedia.org/resource/Fraud + , http://dbpedia.org/resource/Credit_card_fraud + , http://dbpedia.org/resource/Consumer_protection + , http://dbpedia.org/resource/Category:Carding_%28fraud%29 + , http://dbpedia.org/resource/Paper_shredder + , http://dbpedia.org/resource/Computer + , http://dbpedia.org/resource/Computer_game + , http://dbpedia.org/resource/Category:Security + , http://dbpedia.org/resource/Category:Data_security +
http://dbpedia.org/property/wikiPageUsesTemplate http://dbpedia.org/resource/Template:Reflist +
http://purl.org/dc/terms/subject http://dbpedia.org/resource/Category:Carding_%28fraud%29 + , http://dbpedia.org/resource/Category:Data_security + , http://dbpedia.org/resource/Category:Security +
http://purl.org/linguistics/gold/hypernym http://dbpedia.org/resource/Practice +
http://www.w3.org/ns/prov#wasDerivedFrom http://en.wikipedia.org/wiki/Information_diving?oldid=1047658973&ns=0 +
http://xmlns.com/foaf/0.1/isPrimaryTopicOf http://en.wikipedia.org/wiki/Information_diving +
owl:sameAs http://yago-knowledge.org/resource/Information_diving + , https://global.dbpedia.org/id/3hYKv + , http://rdf.freebase.com/ns/m.0dhf94 + , http://it.dbpedia.org/resource/Trashing + , http://ca.dbpedia.org/resource/Trashing + , http://www.wikidata.org/entity/Q3997746 + , http://es.dbpedia.org/resource/Trashing + , http://dbpedia.org/resource/Information_diving +
rdf:type http://dbpedia.org/ontology/Company +
rdfs:comment Il trashing (detto anche information divinIl trashing (detto anche information diving) è la pratica di risalire ad informazioni riservate attraverso il setacciamento dei rifiuti della vittima, come resoconti, bollette, corrispondenza.Ad esempio il truffatore può risalire ai dati di un titolare di carta di credito mediante gli scontrini di acquisto o gli estratti conto emessi durante i prelievi al Bancomat.Dal ritrovamento di scatole di medicinali nella pattumiera si può risalire o, quantomeno, intuire il tipo di malattia da cui la vittima è affetta.o di malattia da cui la vittima è affetta. , Information diving is the practice of recoInformation diving is the practice of recovering technical data, sometimes confidential or secret, from discarded material. In recent times, this has chiefly been from data storage elements in discarded computers, most notably recoverable data remaining on hard drives. Those in charge of discarding computers usually neglect to erase the hard drive. It is often in such circumstances for an information diver to copy installed software (e.g., word processors, operating systems, computer games, etc.). Other data may also be available, such as credit card information that was stored on the machine. Companies claim to be especially careful with customer data, but the number of data breaches by any type of entity (e.g., education, health care, insurance, government, ...) suggest otherwise. In thegovernment, ...) suggest otherwise. In the , El trashing o dumpster diving es una técniEl trashing o dumpster diving es una técnica que permite obtener y recopilar información privada. .​​Es empleada principalmente por crackers (también conocidos como hackers de sombrero negro)​​​​​y periodistas,​aunque también para investigación privada.​La información obtenida puede variar desde nombres de usuario y claves, información personal y otras formas de información sensible.​l y otras formas de información sensible.​
rdfs:label Information diving , Trashing
hide properties that link here 
http://dbpedia.org/resource/Binology + http://dbpedia.org/ontology/wikiPageRedirects
http://dbpedia.org/resource/Carding_%28fraud%29 + , http://dbpedia.org/resource/Trashing + , http://dbpedia.org/resource/Glossary_of_anarchism + , http://dbpedia.org/resource/Jerry_Neil_Schneider + , http://dbpedia.org/resource/Dumpster_diving + , http://dbpedia.org/resource/Shoulder_surfing_%28computer_security%29 + , http://dbpedia.org/resource/Binology + , http://dbpedia.org/resource/TRASHINT + http://dbpedia.org/ontology/wikiPageWikiLink
http://en.wikipedia.org/wiki/Information_diving + http://xmlns.com/foaf/0.1/primaryTopic
http://dbpedia.org/resource/Information_diving + owl:sameAs
 

 

Enter the name of the page to start semantic browsing from.