Data Wiping
-
Upload
jyoti-kumari -
Category
Documents
-
view
15 -
download
1
description
Transcript of Data Wiping
Data Wiping
Presented By
E-Waste Recyclers India
What is Data Wiping
Data erasure (also called data clearing or data wiping) is a software-based method of overwriting the data that aims to completely destroy all electronic data residing on a hard disk drive or other digital media.
What Data Wiping Does?
When you “wipe” a drive, you overwrite all data on it with 0’s, 1’s, or a random mix of 0’s and 1’s.
Why Data Wiping is necessary?
Wouldn’t the mere deletion of files be enough to keep your system secure? With the help of specially designed software applications, hackers can actually retrieve the files that you delete from your computer. To prevent these hacker Data Wiping process is necessary.
Data Wiping process?
Boot and Nuke Method Physical Destruction Method Selective File Wipe Methods
Data Wiping process?
Boot and Nuke Method
» Download Darik's Boot and Nuke
» Burn DBAN to a CD
» Boot from the CD
» Delete the data.
Data Wiping process?
Physical Destruction Method
» Remove the old hard drive» Unscrew all the screws» Destroy the platters
Data Wiping process?
Selective File Wipe Methods
» For Windows» For Mac OS X » For Linux (Ubuntu)
Selective File Wipe Methods
For Windowso Secure delete files, directories or sanitize free
space.oWipe File: Overwrites the specific disk space
occupied by the file you'd like erased.oWBD(Wipe Bad Disk): Can wipe disks with bad
sectors.
Selective File Wipe Methods
For Mac OS X o Permanent Eraser: Can be used as an alternative to
the "Secure empty trash" option. o Disk Utility o srm
Selective File Wipe Methods
For Linux (Ubuntu)oWipe Package from Ubuntu Unleashed: Adds
secure multi-pass file deletion, like DeleteOnClick does in Windows.
Contact us for Secure Data Wiping
E-Waste Recyclers India can help you get the best return out of your excess IT equipment while ensuring that your sensitive information is completely
wiped from the drives.
Conclusion
Data overwritten once or twice may be recovered by subtracting what is expected to be read from a storage location from what is actually read… However by using the relatively simple methods presented in this paper the task of an attacker can be made significantly more difficult, if not prohibitively expensive.