Disposal of Disk and Tape Data by Secure Sanitization EECS711 : Security Management and Audit Spring 2010 Presenter : Sara Mohseni Instructor : Dr. Hossein.

Slides:



Advertisements
Similar presentations
Computer Networks TCP/IP Protocol Suite.
Advertisements

IHE Workshop – June 2006What IHE Delivers 1 Cynthia A. Levy Cedara Software IHE Technical Committee Import Reconciliation Workflow Profile.
ASYCUDA Overview … a summary of the objectives of ASYCUDA implementation projects and features of the software for the Customs computer system.
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
HIPAA AWARENESS TRAINING
So far Binary numbers Logic gates Digital circuits process data using gates – Half and full adder Data storage – Electronic memory – Magnetic memory –
Chapter 6 File Systems 6.1 Files 6.2 Directories
1 DDS Xpress Digital Data Storage Solution. 2 Long-term Goal Legacy Telecoms switches are still operational Expected lifespan at least another 10 years.
The Company that Buys, Sells, and Maintains Enterprise I.T.1 KruseCom Buys, Sells, and Maintains Enterprise I.T.
Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
© SafeNet Confidential and Proprietary Administering SafeNet StorageSecure Smart Card Module 3: Lesson 5 SafeNet StorageSecure Storage Security Course.
IT253: Computer Organization
Hard Disks Low-level format- organizes both sides of each platter into tracks and sectors to define where items will be stored on the disk. Partitioning:
88 CHAPTER SECONDARY STORAGE. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 8-2 Competencies Distinguish between primary & secondary storage.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved. 88 CHAPTER SECONDARY STORAGE.
Hard Disk Drives Chapter 7.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 4: Organizing a Disk for Data.
Computer Studies Today Chapter 18 1 »Two main types of secondary storage devices: –Magnetic storage devices –Optical storage devices.
Living in a Digital World Discovering Computers 2010.
Databasteknik Databaser och bioinformatik Data structures and Indexing (II) Fang Wei-Kleiner.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Secondary Storage Chapter 7.
Mehdi Naghavi Spring 1386 Operating Systems Mehdi Naghavi Spring 1386.
1 Disks Introduction ***-. 2 Disks: summary / overview / abstract The following gives an introduction to external memory for computers, focusing mainly.
Storing Data Chapter 4.
Information Systems Today: Managing in the Digital World
Network, Local, and Portable Storage Media Computer Literacy for Education Majors.
The Office Procedures and Technology
Module 10: Virtual Memory
Computing ESSENTIALS CHAPTER Copyright 2003 The McGraw-Hill Companies, Inc.Copyright 2003 The McGraw-Hill Companies, Inc Secondary Storage computing.
GRAP 3175 Computer Applications for Drafting Unit II Computer Hardware.
1 Lesson 4 Computer Maintenance High School Credit.
Utility program + driver program Thomas Wat 4D (21)
Chapter 6 File Systems 6.1 Files 6.2 Directories
Digital Futures International Forum - Tuesday 18th September 1 Digital Futures International Forum The Digitisation Standard: Back & Forth Stephen Clarke.
IPM THEORY CHALLENGE QUIZ NUMBER 3 Unit 3 Outcome 3.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Introduction to Computer Administration Introduction.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
25 seconds left…...
Identification and Disposition of Official University Records University of Texas at Arlington Records Management.
We will resume in: 25 Minutes.
© ABB University - 1 Revision C E x t e n d e d A u t o m a t i o n S y s t e m x A Chapter 20 Import and Export Course T314.
1 X-Ways Security: Permanent Erasure Supervised By: Dr. Lo’ai Tawalbeh Prepared By :Murad M. Ali.
This presentation will take a look at to prevent your information from being discovered by and investigator.
Media Sanitization How to get rid of unwanted data so no one else can get it.
Disk Clearing and Disk Sanitization
Chapter 12 File Management Systems
Guide to Linux Installation and Administration, 2e1 Chapter 13 Backing Up System Data.
Computer Storage Devices Principles of Information Technology Lytle High School Click to continue.
AS Level ICT Selection and use of storage requirements, media, and devices: Devices and media.
Backup Strategy. Backup strategy Backup copy is a second copy saved to another location, usually on a backup device e.g. USB stick.Backup copy is a second.
Chapter 10 Storage and File Structure Yonsei University 2 nd Semester, 2013 Sanghyun Park.
1 Chapter 12 File Management Systems. 2 Systems Architecture Chapter 12.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Data Recovery Techniques Florida State University CIS 4360 – Computer Security Fall 2006 December 6, 2006 Matthew Alberti Horacesio Carmichael.
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
Data Destruction Is it really gone? Donna Read Chris Parker Florida Gulf Coast ARMA Chapter April 2013.
Component 4: Introduction to Information and Computer Science Unit 4: Application and System Software Lecture 3 This material was developed by Oregon Health.
Mark A. Magumba Storage Management. What is storage An electronic place where computer may store data and instructions for retrieval The objective of.
Module 4.0: File Systems File is a contiguous logical address space.
Component 8 Installation and Maintenance of Health IT Systems Unit 9b Creating Fault-Tolerant Systems, Backups, and Decommissioning This material was developed.
ICT Unit 3 Storage Devices and Media. What is backing up of data? Backing up refers to the copying of file to a different medium It’s useful if in case.
File-System Management
Data Destruction Standards & Compliance
File Managements.
Secondary Storage Devices
File System Implementation
Introduction to the PACS Security
Presentation transcript:

Disposal of Disk and Tape Data by Secure Sanitization EECS711 : Security Management and Audit Spring 2010 Presenter : Sara Mohseni Instructor : Dr. Hossein Saiedian

Organization Introduction Federal Guidelines for Data Sanitization Data Sanitization Laws Data Sanitization through Media Physical Destruction Data Sanitization through Drive or Tape Degaussing Data Sanitization through Block Overwrite or SE Enhanced SE through In-Drive Data Encryption Conclusions 2

Introduction US laws require secure data sanitization to eradicate data in disk and tape drives, but not all methods offer the highest level of security. File deletion erases only file block pointers, links that left a file system reassemble a file. File deletion is fastest and facilitates subsequent restoration of files because data remains on disk, but it isnt secure. Erasure of both pointers and file data is example of secure sanitization. 3

Federally approved methods to reliably sanitize data from retired computer hard disk drives and tapes are critical for both security and privacy reasons. In 2006, the US National Institute of Standards and Technology issued guidelines for media sanitization(NIST ) to address this need. Data sanitization encompasses all data eradication methods, including block-by-block over-write; drive internal secure erase (SE); and physical chemical, thermal, or magnetic destruction. 4 Introduction

Federal Guidelines for Data Sanitization NIST defines four distinct protocols for user data sanitization: – Disposal – Clearing – Purging – Destroying 5

Disposal means discarding storage media without employing any other sanitization or by deleting user file directories in public operating systems such as Windows or Linux. E.g., OS file deletion. Clearing includes computer software utilities that overwrite user data blocks. Block overwrite is the most common data sanitization technique. Clearing is considerably superior to disposal but can result in incomplete sanitization. 6 Federal Guidelines for Data Sanitization

Clearing might not erase user data blocks reassigned to different disk locations. DBAN is an example of popular external block overwrite open source program ( The US Defense Security Service today requires that federal agencies using overwrite utilities have an authorized DoD (Department of Defense) laboratory evaluate them for proper functionality. 7 Federal Guidelines for Data Sanitization

Purging is the next higher sanitization level in NIST Approved methods include the in-drive SE (Secure Erase) command and magnetic degaussing of disk drives or tape reels. SE is faster than external-block-overwrite programs such as DBAN because SE is overwrite with no host- to-drive data transfer of the write pattern. SE write pattern is predefined and originates from inside the drive. 8 Federal Guidelines for Data Sanitization

Destroying is the highest level of sanitization per NIST , meaning media physical destruction by disintegration, incineration, pulverizing, shredding, chemical attack, or melting. Users tend to select the method that provides an acceptable security level in a reasonable time window. Many users avoid a high-security protocol that requires special software and days to accomplish, making such a protocol less used and thus less practical. 9 Federal Guidelines for Data Sanitization

10 Federal Guidelines for Data Sanitization

11 Federal Guidelines for Data Sanitization

Data Sanitization Laws Many users are aware of legal-compliance regulations in data privacy laws regarding long-term data retention. But they might not know that those laws also specify requirements for data sanitization. Strict local, state, and federal legislation protecting consumers, medical patients, investors, and the environment specify that organizations must be careful when disposing or repurposing digital equipment. 12

US laws that address data sanitization for storage devices include: – Health Insurance Portability and Accountability Act (HIPAA) – Gramm-Leach-Bliley Act (1999) – California Senate Bill 1386 (2002) – The Sarbanes-Oxley Act (2002) – The Care and Accurate Credit Transactions Act (2003) – SEC Rule 17a (1997) Users should meet these legal requirements at the highest standards consistent with their operations. 13 Data Sanitization Laws

Data Sanitization through Media Physical Destruction For the highest security, tapes and disks removed from drives should be destroyed. Disks and tape destruction involves breaking up or shredding media, chemically or thermally destroying media surfaces, or grinding media in to microscopic pieces. Simple disk-bending provides more effective destruction than many realize, because drive read- and-write heads will either crash or fly high to read data, and different heads cant easily read the media. 14

Physical destruction doesnt provide absolute certainty against hypothetical exotic forensics data recovery method if any remaining unerased disk pieces are larger than a record block. (This would be about 1/25 inch or 0.2 mm for 512-byte blocks in most current disk drives. As drive linear and track densities increase, the maximum allowable disk fragment size will become even smaller. 15 Data Sanitization through Media Physical Destruction

Data Sanitization through Drive or Tape Degaussing Degaussers are commercial instruments that bulk- demagnetize disk drives and tape reels. Degaussers use high-intensity magnetic fields to erase magnetic media in a drive or tape, including record headers and servo bursts – information required for head positioning and data recovery. Older Degaussers might not be able to erase data on higher-data-capacity disk drives which require higher demagnetization fields (because of their higher disk media coercivity). 16

Older Degaussers also were designed for older longitudinal recording drives and might not be able to erase todays perpendicular recording drives. Degaussing will remain entirely practical for tape media because tape coercivity is far lower than disk media and is expected to remain so for some time. 17 Data Sanitization through Drive or Tape Degaussing

18 Data Sanitization through Drive or Tape Degaussing

Data Sanitization through Block Overwrite or SE SCSI (Small Computer System Interface) and ATA (Advanced Technology Attachment) interface drives specifications support SE (Secure Erase) command. ATA SE writes binary 0s or 1s, conveniently allowing an SE to be verified. SCSI specifications let users specify the SE pattern and state that the command intent is to render any previous user data unrecoverable by any analog or digital technique. 19

Both the ATA and SCSI SE specifications require that a drive overwrite all user areas that have ever been accessible, up to the maximum native drive capacity. SCSI specifications additionally require erasing all reassigned blocks. An ATA SE also sanitizes hybrid-drive flash memories. 20 Data Sanitization through Block Overwrite or SE

Enhanced SE through In-Drive Encryption Computer OS data encryption is a common feature but isnt often used. Encryption in large enterprise computer systems defeats the operation of many important data management functions, such as incremental backup, continuous data protection, data compression, deduplication, archiving. Efforts to defeat these operations cause significant data access speed and cost penalties to enterprise storage. 21

Recently, Seagate and Hitachi introduced 2.5-inch secure disk drives for laptop computers. These drives, called full disk encryption (FDE) or self- encrypting drives, internally encrypt user data before magnetic recording. FDE drives provide data protection in case a laptop or drive is lost or stolen. 22 Enhanced SE through In-Drive Encryption

They also offer a new and virtually instantaneous way to sanitize data by securely changing their internal encryption key. FDE drives allow ESE (Enhanced SE) which additionally requires a drive to overwrite all previously written user data, including sectors no longer in use due to reallocation. 23 Enhanced SE through In-Drive Encryption

Conclusion To provide the highest confidence in meeting government laws protecting user privacy, use the SE command in computer storage devices, where possible. Otherwise, use block-overwrite utilities on entire drives. Use secure physical destruction of devices that contain data with the highest security classification level (for example, top secret and above). 24