Data Recovery: Why Secure Deletion is so Important.

Slides:



Advertisements
Similar presentations
Its more than a game, its your life…. What do you do online?
Advertisements

Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Backing Up Your Computer Hard Drive Lou Koch June 27, 2006.
By David Williams. What is CCleaner ? CCleaner (formerly Crap Cleaner), developed in 2003 by Piriform is a donationware utility program for windows operating.
Explanations Of Software Utilities By Tim Wong.
Computer Troubleshooting (and other interesting facts) Presented by: Kristi Manuel and Derwin Woodard.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
Microsoft Office Illustrated Fundamentals Unit B: Understanding File Management.
Data Deletion and Recovery. Data Deletion  What does data deletion mean in your own words?
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Computer Basics.  Be sure to check with your school’s Network Administrator and/or Handbook before you make changes to your school computer.
Practical PC, 7th Edition Chapter 5: Organizing Files and Folders
Computers in the real world Objectives Understand what is meant by memory Difference between RAM and ROM Look at how memory affects the performance of.
1 Chapter 2 & Chapter 4 §Browsers. 2 Terms §Software §Program §Application.
Chapter 18: Windows Server 2008 R2 and Active Directory Backup and Maintenance BAI617.
PC Maintenance How to keep your computer healthy.
Disaster DATA Recovery & Your System School/Network Computers Catherine Agnew CEDu Oconomowoc.
FACEBOOK IS THE BEST THING THAT EVER HAPPENED TO FRIENDSHIP WHY I LIKE FACEBOOK! By Mike Matthews.
C HAPTER 7 Managing Disk and File System. I NTRODUCING DISK MANAGEMENT 2 types of hard disk storage supported by Windows XP are: basic hard disk & dynamic.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Computer security By Isabelle Cooper.
It’s more than a game, it’s your life… What do you do online?
Matthew Glenn AP2 Techno for Tanzania This presentation will cover the different utilities on a computer.
Start with loading the picture Locate your camera’s USB cable –it looks something like this:
Society & Computers PowerPoint
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Sniper Corporation. Sniper Corporation is an IT security solution company that has introduced security products for the comprehensive protection related.
E-Safety Parent Talk Helping to keep your children safe online.
Computer Security Keeping you and your computer safe in the digital world.
Troubleshooting Dashhawk Issues. Here's what you have to do to have the DashHawk run properly Go to the ACTUAL PROGRAM file (not the short cut)
DIT314 ~ Client Operating System & Administration CHAPTER 7 MANAGING DISKS AND FILE SYSTEM Prepared By : Suraya Alias.
Computer Security  Computer Security:  Password Strength  Windows Screen Saver  Deleting browser cache  Deleting browser cookies  Securing MS Office.
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
Basic Guide to Computer Backups Eric Moore Computer Users Group of Greeley September 13, 2008.
Dial-In Number: 1 (631) Webinar ID: FHC Tech Talk Automation and Efficiency Series Talk #1 Carbonite automated backup.
Networking Objectives Understand what the following policies will contain – Disaster recovery – Backup – Archiving – Acceptable use – failover.
This presentation uses a free template provided by FPPT.com Kaspersky Antivirus software: Multiple additions, same integrity.
Lesson 13 PROTECTING AND SHARING DOCUMENTS
Chapter 6 Protecting Your Files
Creating your online identity
Basic Guide to Computer Backups
The importance of computer backups
Common Methods Used to Commit Computer Crimes
Using iLocker.
Ways to protect yourself against hackers
Introducing ‘Snap Maps’
Home Computer Security
How to Fix Boot Error 0xc000000e on Windows
Introduction to Computers
Lesson 13 PROTECTING AND SHARING DOCUMENTS
Importance of Privacy Internet Safety
Call AVG Antivirus Support | Fix Your PC
Cloud Storage Services
Risk of the Internet At Home
What Is Google File Stream
Chapter 8 Managing Files.
Spyware. By: Katheryn L. Gaston.
Normal deletion Shift deletion
Technology Mrs. Huddleston
Stay Safe While Using The Internet
Using TrueCrypt 6th May 2009.
Part C Computer Storage
Office 365.
Solutions to Secure File Deletion
Microsoft Office Illustrated Fundamentals
Introducing ‘Snap Maps’
6. Application Software Security
How might your children ‘play the system’?
Keeping your passwords safe
Presentation transcript:

Data Recovery: Why Secure Deletion is so Important. By: Jonathan Charlton IASP 470 DLA

Is that file you deleted, really deleted? When you click “Delete” on a file what happens to it? When a file is deleted from your Recycling Bin the contents are not deleted. Instead of deleting the contents, the route through which you access the file normally is just cut off until new data overwrites the sector that used to exist where the deleted file was present. Why is this done? If the contents were to be completely deleted it would require the processing power of writing the same file size you removed to the disk again. For example, deleting a 1GB file takes the same time as creating a new 1GB file on top of the time to delete it.

So Do I Have to burn all my Drives? While that is the most secure way to completely remove a file from existence, it is not entirely necessary. While some individuals claim that complete destruction of a drive is required to erase the contents from existence, there are tools that will automate the process of clearing the space the deleted content was once stored. Popular program CCleaner has a feature to completely wipe the “Free” space on your hard drive. Wiping the “Free” space actually rewrites the space available for storing files on your drive with just 1’s and 0’s. Once wiped the data in its entirety will be removed in most cases.

The SSD Issue While hard drives may have a method of erasing the contents entirely, you cannot remove the contents of a Solid-State-Drive or USB in the same way. The only completely secure method of deleting SSD contents or USB contents is destroying the drive that houses them. Even two completely wipes of an SSD will still produce some of the data that was meant to be deleted, not always, but even once is too often when security is a concern. So what can be done to secure your data? Full-Disk-Encryption is the most common method of safely storing data on an SSD or USB flash drive. Pictured on the right is a program for windows known as Recuva, it does an excellent job of recovering files that have been deleted without secure methods. Conveniently, Piriform the company that created Recuva, also created CCleaner.

Why Bother with Secure Deletion? So why is it actually important that you securely remove files, your device shouldn’t leave your possession right? Often systems are compromised without user knowledge, Remote Administration Tools or RATs allow an intruder full access to all of your system’s files and permissions. A skilled hacker with administrative access to your PC can clone your system entirely without you ever knowing. Your files are now theirs, unencrypted and free to browse. And even if you aren’t infected with a RAT, there are many other forms of malware that can achieve the same or similar results. https://codecanyon.net/item/warden-remote-administration-tool/22497434

“I Don’t do Anything Bad I Have Nothing to Hide” A common phrase associated with those who are less privacy driven than myself, but those who are not secure are at risk as well. The “bad people” who know what they are doing is a problem are usually the most secure individuals because they don’t want to be caught. The “good people” who don’t care about system security can be the scapegoat for the “bad people” much easier. If I want to blame you for having an illegal image and I host it on your computer and delete it, you are now the owner of that illegal image and can be taken to jail for it.

“But I Didn’t Download that File” You don’t even need to download a file for it to be on your computer, because your computer caches images it comes into contact with. This was an issue, (and still is) with popular media-sharing application “Snapchat” that is meant to delete images after a few seconds once you receive them. If you clicked on an image once, or viewed it in any way, a temporary version of it can be accessed without clicking “save”. It isn’t just images your computer saves either, browser cookies hold an enormous amount of your personal data. If you aren’t already, start clearing those cookies.

The Truth About Data Security Online The hard fact about having any of your information or data on a device connected to the internet is, it is never completely safe. Every day we hear about some new data breach in the real world, on targets that are by no means easy to infiltrate. Our data is not completely in our hands anymore, everywhere you have entered data online, every account you have created and every interaction with a Federal establishment that required your information can be found online or in some database if it was stored. This means you are always at risk and should account for that possible risk with a contingency plan at any given point in your life.

What I Want to Achieve With this Project I want to gain and impart onto others a greater understanding of safe deletion methods for your data both online and offline. I want anyone that views my project to at least be able to delete a file from their computer completely without having a way to recover it by any normal methods. I want anyone that views my project to feel a greater sense of security through what they have learned and I want everyone to be able to add a program that I talk about to their own set of tools.