Please use this identifier to cite or link to this item:
https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/9475
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | D. Evangeline | - |
dc.date.accessioned | 2024-02-27T07:12:41Z | - |
dc.date.available | 2024-02-27T07:12:41Z | - |
dc.date.issued | 2020 | - |
dc.identifier.uri | http://gnanaganga.inflibnet.ac.in:8080/jspui/handle/123456789/9475 | - |
dc.description.abstract | Everyone has heard of an old adage 'One man's garbage is another man's treasure." It is relevant even in today's world. Hackers try to extract useful information from the network using much number of ways. Dumpster Diving is one such attack that has been playing such a role for quiet sometime [1 ]. Usually, hackers try to find useful information from the garbage. In case the hacker gets a user's credentials, impersonation is done. Hence, any kind of information, even when disposed must be done in well-calculated manner such that the wrong people do not gain access to the same [2]. | - |
dc.publisher | CSI Communications | - |
dc.title | Electronic Dumpster Diving | - |
dc.vol | Vol 43 | - |
dc.issued | No 12 | - |
Appears in Collections: | Articles to be qced |
Files in This Item:
File | Size | Format | |
---|---|---|---|
Electronic Dumpster Diving- D Evangeline.pdf Restricted Access | 350.53 kB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.