Download
data destruction n.
Skip this Video
Loading SlideShow in 5 Seconds..
Data Destruction PowerPoint Presentation
Download Presentation
Data Destruction

Data Destruction

238 Vues Download Presentation
Télécharger la présentation

Data Destruction

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Data Destruction How to Erase your Hard Drive’s so that there is no data leakage from your company and so that your company and officers won’t be held financially responsible. By: Lloyd Albin 3/9/2010

  2. How this all got started. • Needing to get rid of more than 3 truck loads of computers (major computer pack rat). • Known Methods: • Re-Formatting • Re-Partitioning • Overwriting multiple times • Degaussing • Opening and breaking the platters • Cooking in oven

  3. DoD Sanitization Methods

  4. Clearing Standards

  5. Cleaning Software – Block Erase • Darik’sBoot and Nukehttp://www.dban.org/ • Eraserhttp://eraser.heidi.ie/ • Active KillDiskhttp://www.killdisk.com/ • File Shredderhttp://www.fileshredder.org/ • Paragon Disk Wiper Professionalhttp://www.disk-wiper.com/

  6. Purging Standards

  7. Purging Software – Secure Erase • CCMR Secure Erase (HDDErase) http://cmrr.ucsd.edu/people/Hughes/SecureErase.shtml • Hddparmhttp://sourceforge.net/projects/hdparm/http://hdparm-win32.dyndns.org/hdparm/

  8. What does Secure Erase do? • Security Set Password (F1h) • Security Freeze Lock (F5h) • Security Erase Prepare (F3h) • Security Erase Unit (F4h) • Security Unlock (F2h) • Security Disable Password (F6h)

  9. What does Sanitize Device do? • Sanitize Freeze Lock Ext (20h) • Sanitize Prepare (FFh) * • Sanitize Status Ext (0h) • Crypto Scramble Ext (11h) • Block Erase Ext (12h) • Overwrite Ext (14h)

  10. Crushing and Shredding

  11. 844 grams of Thermite Destruction

  12. References • http://cmrr.ucsd.edu/people/Hughes/CmrrSecureEraseProtocols.pdf • Peter Gutmannhttp://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html • NIST 800-88http://csrc.nist.gov/publications/nistpubs/800-88/NISTSP800-88_rev1.pdf • http://mareichelt.de/pub/notmine/sanitizing.html • http://www.t13.org/Documents/UploadedDocuments/docs2009/d2015r2-ATAATAPI_Command_Set_-_2_ACS-2.pdf • http://ata.wiki.kernel.org/index.php/ATA_Secure_Erase • http://www.t13.org/Documents/UploadedDocuments/docs2008/e07197r1-T13_Sanitize_Command_Proposal_Overview.pdf • Overwriting Hard Drive Data: The Great Wiping Controversyhttp://www.springerlink.com/content/408263ql11460147/ • http://en.wikipedia.org/wiki/AT_Attachment • http://www.killdisk.com/downloads/KillDisk_Win5.pdf • http://www.seagate.com/staticfiles/support/disc/manuals/notebook/momentus/5400.6%20(Wyatt)/100528359e.pdf • http://www.redbooks.ibm.com/technotes/tips0761.pdf • http://www.h-online.com/newsticker/news/item/Secure-deletion-a-single-overwrite-will-do-it-739699.html