1 / 12

Data Destruction

Data Destruction. How to Erase your Hard Drive’s so that there is no data leakage from your company and so that your company and officers won’t be held financially responsible . By: Lloyd Albin 3/9/2010. How this all got started .

bryony
Télécharger la présentation

Data Destruction

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Data Destruction How to Erase your Hard Drive’s so that there is no data leakage from your company and so that your company and officers won’t be held financially responsible. By: Lloyd Albin 3/9/2010

  2. How this all got started. • Needing to get rid of more than 3 truck loads of computers (major computer pack rat). • Known Methods: • Re-Formatting • Re-Partitioning • Overwriting multiple times • Degaussing • Opening and breaking the platters • Cooking in oven

  3. DoD Sanitization Methods

  4. Clearing Standards

  5. Cleaning Software – Block Erase • Darik’sBoot and Nukehttp://www.dban.org/ • Eraserhttp://eraser.heidi.ie/ • Active KillDiskhttp://www.killdisk.com/ • File Shredderhttp://www.fileshredder.org/ • Paragon Disk Wiper Professionalhttp://www.disk-wiper.com/

  6. Purging Standards

  7. Purging Software – Secure Erase • CCMR Secure Erase (HDDErase) http://cmrr.ucsd.edu/people/Hughes/SecureErase.shtml • Hddparmhttp://sourceforge.net/projects/hdparm/http://hdparm-win32.dyndns.org/hdparm/

  8. What does Secure Erase do? • Security Set Password (F1h) • Security Freeze Lock (F5h) • Security Erase Prepare (F3h) • Security Erase Unit (F4h) • Security Unlock (F2h) • Security Disable Password (F6h)

  9. What does Sanitize Device do? • Sanitize Freeze Lock Ext (20h) • Sanitize Prepare (FFh) * • Sanitize Status Ext (0h) • Crypto Scramble Ext (11h) • Block Erase Ext (12h) • Overwrite Ext (14h)

  10. Crushing and Shredding

  11. 844 grams of Thermite Destruction

  12. References • http://cmrr.ucsd.edu/people/Hughes/CmrrSecureEraseProtocols.pdf • Peter Gutmannhttp://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html • NIST 800-88http://csrc.nist.gov/publications/nistpubs/800-88/NISTSP800-88_rev1.pdf • http://mareichelt.de/pub/notmine/sanitizing.html • http://www.t13.org/Documents/UploadedDocuments/docs2009/d2015r2-ATAATAPI_Command_Set_-_2_ACS-2.pdf • http://ata.wiki.kernel.org/index.php/ATA_Secure_Erase • http://www.t13.org/Documents/UploadedDocuments/docs2008/e07197r1-T13_Sanitize_Command_Proposal_Overview.pdf • Overwriting Hard Drive Data: The Great Wiping Controversyhttp://www.springerlink.com/content/408263ql11460147/ • http://en.wikipedia.org/wiki/AT_Attachment • http://www.killdisk.com/downloads/KillDisk_Win5.pdf • http://www.seagate.com/staticfiles/support/disc/manuals/notebook/momentus/5400.6%20(Wyatt)/100528359e.pdf • http://www.redbooks.ibm.com/technotes/tips0761.pdf • http://www.h-online.com/newsticker/news/item/Secure-deletion-a-single-overwrite-will-do-it-739699.html

More Related