An often used
method is dumpster diving (Granger, 2001), i.e., searching
through an organization's trash. A dumpster can be a valuable
source of information for attackers, who may find personal
data about employees, manuals, memos and even print-outs
of sensitive information, such as user credentials