Which of the following might an attacker resort to in order to recover discarded company documents?
A.
Phishing
B.
Insider theft
C.
Dumpster diving
D.
Shoulder surfing
Which of the following might an attacker resort to in order to recover discarded company documents?
Which of the following might an attacker resort to in order to recover discarded company documents?
A.
Phishing
B.
Insider theft
C.
Dumpster diving
D.
Shoulder surfing