Solutions to Secure File Deletion

Slides:



Advertisements
Similar presentations
Laptop Security in the current IT world W3 group.
Advertisements

Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
1 of 2 By observing the guidelines below and performing regular maintenance on your computer, you can help keep your computer safe and maintain optimum.
Hard Drives on Your Old Desktop Computer SIR Phil Goff Branch 116 August 21,
1 X-Ways Security: Permanent Erasure Supervised By: Dr. Lo’ai Tawalbeh Prepared By :Murad M. Ali.
This presentation will take a look at to prevent your information from being discovered by and investigator.
By David Williams. What is CCleaner ? CCleaner (formerly Crap Cleaner), developed in 2003 by Piriform is a donationware utility program for windows operating.
SECURITY CHECK Protecting Your System and Yourself Source:
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Explanations Of Software Utilities By Tim Wong.
1 Pertemuan 23 Contingency Planning Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
Tips and Techniques: How to Protect Yourself and Others Better Jeanne Smythe February 20, 2004.
Simple Computer Maintenance. Common Computer Clean up Tasks Disk Clean – up Anti-virus scan Deleting Cookies.
A Feature-Based of IT Automation using kaseya’s agent procedure called the wiping of unallocated disk space using cipher.exe Developed By: Estuardo Fernandez.
Chapter 5: System Software: Operating Systems and Utility Programs.
Data Deletion and Recovery. Data Deletion  What does data deletion mean in your own words?
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Operating System Utility Programs & Stand-alone utility Programs.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
IT Security for Users By Matthew Moody.
March 2013 LCCU Meeting Judy Grindle will discuss and demonstrate: –How can you securely clean off files and programs from a PC before donating it, or.
BACKUP AND ARCHIVING DATA BACKUP AND RECOVERY OF DATA.
By Ramneek Hundal.. 5 types of Virus.. I LOVE YOUI LOVE YOU. WormsWorms.TROJEN HORES.MELISSA.HAPPY 99 What is a virus. A computer virus is a computer.
C ONFUSED, F RUSTRATED, C OME OVER AND SEE US AT THE HELP DESK. We can help you with this and much, much more.
Data Recovery Techniques Florida State University CIS 4360 – Computer Security Fall 2006 December 6, 2006 Matthew Alberti Horacesio Carmichael.
VIRUS Is a computer program that can copy itself and infect a computer without permission or knowledge of the user or is a program or piece of code that.
Used to request permission to remove parts from an existing piece of inventory Assumes that the original equipment is being removed from the departmental.
Computer Maintenance. Clean up tools How I Defragmented the Hard Drive.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
Emily Ansell 8K viruseshackingbackups next. Viruses A virus is harmful software that can be passed to different computers. A virus can delete and damage.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Archiving is downloading, keeping and protecting s that you are receiving or sending so they can be accessed at another time. Archiving.
We are here to help you… Fight something like this Brownies !
Lesson 12: Using the Recycle Bin deleting files or folders what the Recycle Bin is restoring files from the Recycle Bin emptying the Recycle Bin identifying.
CLOUD COMPUTING JAZ PATERNOSTER. DEFINITION Cloud computing is the use of ‘the cloud’ as a place to save files rather than in a personal computer, allowing.
Backups. What is a backup. A backup is when someone copies some data (like you may copy and paste your schoolwork!) and sends it to another workstation.
Tools Jerry Naditch October 7, Top 5 Sources Piriform – –Famous for CCleaner, Defraggler, Recuva,
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Forensics Jeff Wang Code Mentor: John Zhu (IT Support)
Understand Encryption LESSON 2.5_A Security Fundamentals.
Society & Computers PowerPoint
Technology Education THE PERSONAL COMPUTER (PC) SOFTWARE PART 1.
Here are some virus safety rules By Corey. Update anti virus once a week so no new viruses can get in you’re devices like laptops, phones, usb stick and.
Jake Horsfield (P3/D1) PURPOSE OF SOFTWARE UTILITIES.
“Candidates were not advantaged by defining every type of operating system provided as examples in the explanatory notes of the standard. Candidates who.
Sniper Corporation. Sniper Corporation is an IT security solution company that has introduced security products for the comprehensive protection related.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Computer Security Keeping you and your computer safe in the digital world.
The information that is stored on business computer and hard drives needs to be securely destroyed and is important part of managing the information security.
Backup and Disaster Dr Stuart Petch CeG IT/IS Manager
Dial-In Number: 1 (631) Webinar ID: FHC Tech Talk Automation and Efficiency Series Talk #1 Carbonite automated backup.
Sharing and Synching files
Version Control with Subversion
Common Methods Used to Commit Computer Crimes
How to Recover Deleted Voice Memos on iPhone 5/4S/4?
Unit 4 IT Security.
ITEC 202 Operating Systems
Unit 4 IT Security.
Chapter 12: Apps of Note and Websites of Interest
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Basic Computer Maintenance
Staying Austin College
HOW TO BETTER USE AVG ANTIVIRUS TIPS AND TRICKS. By default automatic healing of viruses is not enabled in AVG Antivirus, we require to enable it in order.
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
Normal deletion Shift deletion
Data Recovery: Why Secure Deletion is so Important.
Presentation transcript:

Solutions to Secure File Deletion By: Jonathan Charlton IASP 470 - DLA

Ignoring Secure File Deletion For a second, let’s assume that you were hosting confidential files on a USB until you were given a new company laptop. You delete the files on the USB after they have been copied over to the laptop and you give the USB to someone else because you don’t need it anymore. Anyone that finds that USB can recover those files and gain access to your confidential information. While this may seem like an issue that does not happen often, even one instance of this occurring could compromise an entire network. Once a network is compromised because of your files being recovered, there is a high likelihood you are the one that will take the fall for it.

How Are These Files Recovered? The same company that provides you the tools to securely delete files from your devices, also has a tool that can recover the files you do not securely delete. Recuva is a file recovery tool that scans the space on your hard drives for the remains of files that have been deleted through methods that are not secure. In the best case scenario for a malicious user, the files will exist without being overwritten at all. In the worst case the files will be partially overwritten or completely unrecoverable. How can you protect yourself from your lost or stolen data being recovered?

Priority Number One CCleaner CCleaner from software Developer Piriform is shipped as software meant to be used to clean up your computer’s unused or temporary files, as well as internet history, cookies and your registry. The program also comes with a tool to wipe your hard drive’s “free space” to securely delete any files that you may have previously removed from your computer. If the drive may be compromised at any point and you have knowledge of this ahead of time, you can also wipe the entire drive so that there is no remaining files, just a sea of 1’s and 0’s that mean nothing.

Priority Number Two While completely wiping your drive(s) with CCleaner multiple times leaves you with a drive that previously deleted data will be almost unrecoverable, for the more security inclined drive destruction will be a much safer method for protecting data. A common practice in government agencies, completely destroying a drive is the guaranteed way that no one will recover your data. In the event that you need to fully destroy a drive you are probably handling data that is too confidential for a normal end-user and you will have more confidential file deletion methods and proprietary programs not available to the public.