Sanitizing Data from Storage Devices with a Live CD Brian Compton College of Technology – University of Houston Sanitizing Data from Storage Devices with.

Slides:



Advertisements
Similar presentations
Working with Disks and Devices
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Backing up and Archiving Data Chapter 1. Introduction This presentation covers the following: – What is backing up – What is archiving – Why are both.
Backing Up Your Computer Hard Drive Lou Koch June 27, 2006.
Disclaimer Certain trade names and company products are mentioned in the text or identified. In no case does such identification imply recommendation.
1 X-Ways Security: Permanent Erasure Supervised By: Dr. Lo’ai Tawalbeh Prepared By :Murad M. Ali.
This presentation will take a look at to prevent your information from being discovered by and investigator.
Full-Datapath Secure Deletion Sarah Diesburg 1. Overview Problem  Current secure deletion methods do not work State of the art  Optimistic system-wide.
Disk Clearing and Disk Sanitization
Princeton PC Users Group Hard Drive Disaster! By Paul Kurivchack March 14, 2005.
5-9/12/2005 CPE How to format your computer and re-install Windows XP.
A Guide to Choosing a Secure USB Flash Drive Solution Brian Compton College of Technology – University of Houston A Guide to Choosing a Secure USB Flash.
Issues to Consider when Choosing a Secure USB Flash Drive Solution Brian Compton College of Technology – University of Houston Issues to Consider when.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
COMPUTER BACKUP A disaster will happen to you one day…an accidentally deleted file, a new program that caused problems or a virus that wreaked havoc, wiping.
Computer Parts There are many parts that work together to make a computer work.
Computer Storage Devices Principles of Information Technology Lytle High School Click to continue.
Computer Basics Flashcards #2
Chapter 3 Storage Prepared by: Mrs. Hanan AL- Asmari 1.
ENCRYPTION Coffee Hour for August HISTORY OF ENCRYPTION Scytale Ciphers – paper wrapped around rod, receiver needed same size rod to get the message.
Chapter 4: Operating Systems and File Management 1 Operating Systems and File Management Chapter 4.
OPSEC Awareness Briefing Multi-Function Printer (MFP) Security.
Backup Strategy. Backup strategy Backup copy is a second copy saved to another location, usually on a backup device e.g. USB stick.Backup copy is a second.
Data Deletion and Recovery. Data Deletion  What does data deletion mean in your own words?
Changing the Way Systems are Deployed 1. 2 * Ghost since 1999 * Almost 4500 licenses * Prior to 2007 license count increase of 5% or greater a year *
Configuring the MagicInfo Pro Display
Computers in the real world Objectives Understand what is meant by memory Difference between RAM and ROM Look at how memory affects the performance of.
Drive Imaging Joe Cicero Northeast Wisconsin Technical College.
IT Essentials 1 v4.0 Chapters 4 & 5 JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
ITE 1 Chapter 5. Chapter 5 is a Large Chapter It has a great deal of useful information about operating systems. You will find this VERY helpful when.
Hard Drive Overview: The UltraMax Plus, MiniMax and eGo Firewire+ Drives Erik Collett Chinese Product Launch IOMEGA CONFIDENTIAL.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
Chapter 4 Solving Data Backup Challenges Prepared by: Khurram N. Shamsi.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
Computers in the real world Objectives Explain the need for secondary storage devices Understand the three main storage types – Optical – Magnetic – Solid.
TEMPLATE DESIGN © Android Data Confidentiality Alex Mayer University of Houston Abstract Employees are increasingly relying.
Please Note: Information contained in this document is considered LENOVO CONFIDENTIAL For Lenovo Internal Use Only Do Not Copy or Distribute!! For Lenovo.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Chapter 2 Working with Disks and Other Removable Media 2.
Data Recovery Techniques Florida State University CIS 4360 – Computer Security Fall 2006 December 6, 2006 Matthew Alberti Horacesio Carmichael.
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
Guide to Linux Installation and Administration, 2e1 Chapter 2 Planning Your System.
Installation Overview Lab#2 1Hanin Abdulrahman. Installing Ubuntu Linux is the process of copying operating system files from a CD, DVD, or USB flash.
Full-Datapath Secure Data Deletion Sarah Diesburg 5/4/
1 Computer Maintenance Upgrading Your PC: Flash Memory and Gathering User Information Copyright © Texas Education Agency, All rights reserved.
Using BackTrack to Discover Cisco Vulnerabilities Brian Compton College of Technology – University of Houston Using BackTrack to Discover Cisco Vulnerabilities.
Chapter 3 Installing and Learning Software. 2Practical PC 5 th Edition Chapter 3 Getting Started In this Chapter, you will learn: − What is in an application.
Storage Devices Primary storage: is the storage provided by memory in a computer system Secondary storage: is storage provided by peripheral devices other.
Complete System Backup Microsoft Acronis TimeMachine (Mac)
Microsoft Windows XP Professional MCSE Exam
Understanding Backup and Recovery Methods Lesson 8.
Click once to reveal the definition. Think of the answer. Then click to see if you were correct. HARDWARE Physical parts of the computer.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
IT-IDT-5 Understand, communicate, and adapt to a digital world. File Management.
2007 TAX YEARERO TRAINING - MODULE 61 ERO (Transmitter) Training Module 6 Federal and State Installation and Updates.
Page 1 of 38 Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Please Note: Information contained in.
Software - Utilities Objectives Understand what is meant by utility software and application software Look at common utilities – Security – Disk organisation.
MAC OS – Unit A Page:14-15 Understand Storage Media.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 24 Troubleshooting and Maintenance Fundamentals.
Chapter 8 Forensic Duplication Spring Incident Response & Computer Forensics.
Ahmadu Bello Computer Repair Training Course 6: Use of Software By Suprix Technology Nigeria ( A.B.U repair computer training.
Staying Secure in an Insecure World NATE HOWE CHIEF INFORMATION SECURITY OFFICER Education – Partnership – Solutions.
Complete System Backup Microsoft Acronis TimeMachine (Mac)
How To Reset an HP Computer Without a Restore Disc?
Discovering Computers 2012: Chapter 2-7
Upgrading Your PC: Flash Memory and Gathering User Information
Normal deletion Shift deletion
IT-IDT-5 Understand, communicate, and adapt to a digital world.
TERMS AND CONDITIONS   These PowerPoint slides are a tool for lecturers, and as such: YOU MAY add content to the slides, delete content from the slides,
Presentation transcript:

Sanitizing Data from Storage Devices with a Live CD Brian Compton College of Technology – University of Houston Sanitizing Data from Storage Devices with a Live CD Brian Compton College of Technology – University of Houston Problem Statement Organizations often fail to properly remove data prior to retiring and discarding storage devices. This data can be discovered by 3 rd parties, leading to a breach of data confidentiality. This can be avoided by incorporating the use of utilities that securely remove data into polices that address hardware retirement. Problem Statement Organizations often fail to properly remove data prior to retiring and discarding storage devices. This data can be discovered by 3 rd parties, leading to a breach of data confidentiality. This can be avoided by incorporating the use of utilities that securely remove data into polices that address hardware retirement. Free Open Source Tools Sanitize Data The question at hand is how to completely and permanently remove data from storage devices. There are a number of utilities available that have the ability to completely remove data from storage media. They range from simple open source tools freely available to enterprise security applications that have a hefty cost. A company can integrate the use of free open source software into their security polices. Utilities available on Live CDs, such as BackTrack 4, can fulfill the need to completely remove date from storage devices prior to removing them from the enterprise. This is important to companies that prefer to donate or sell used equipment rather than destroying old devices. The utilities available on Live CDs can be used on any many systems. One can sanitize a hard disk that is attached to the PC booting the Live CD. This can be done because the hard drive is not needed to operate the Linux OS from the cd. One can also sanitize any storage device that can be connected to the PC that has booted the Live CD. An external hard drive enclosure, flash drive, or card reader plugged into the PC via a USB connection can be mounted within Linux and wiped of data. The use of a Live CD gives on the ability to erase a hard drive that is malfunctioning or has a non- functioning operating system. As one becomes more familiar with the use of Linux Live CDs, they can even begin to develop scripts and routines to automate the process of correctly removing data form storage devices. Free Open Source Tools Sanitize Data The question at hand is how to completely and permanently remove data from storage devices. There are a number of utilities available that have the ability to completely remove data from storage media. They range from simple open source tools freely available to enterprise security applications that have a hefty cost. A company can integrate the use of free open source software into their security polices. Utilities available on Live CDs, such as BackTrack 4, can fulfill the need to completely remove date from storage devices prior to removing them from the enterprise. This is important to companies that prefer to donate or sell used equipment rather than destroying old devices. The utilities available on Live CDs can be used on any many systems. One can sanitize a hard disk that is attached to the PC booting the Live CD. This can be done because the hard drive is not needed to operate the Linux OS from the cd. One can also sanitize any storage device that can be connected to the PC that has booted the Live CD. An external hard drive enclosure, flash drive, or card reader plugged into the PC via a USB connection can be mounted within Linux and wiped of data. The use of a Live CD gives on the ability to erase a hard drive that is malfunctioning or has a non- functioning operating system. As one becomes more familiar with the use of Linux Live CDs, they can even begin to develop scripts and routines to automate the process of correctly removing data form storage devices. Conclusion Companies are allowing private and sensitive data to slip out of their control by not properly sanitizing data prior to retiring hardware. This should be addressed by adopting policies that stipulate the use of utilities to completely and securely remove data from storage devices before they are eliminated from the corporate environment. By adopting a sound policy and using free open source data erasing utilities, an organization can mitigate the threat of breaking data confidentiality. In addition to mitigating this threat, companies can opt to donate or sell retired hardware that has been properly sanitized, rather than destroying aging but useful equipment. Conclusion Companies are allowing private and sensitive data to slip out of their control by not properly sanitizing data prior to retiring hardware. This should be addressed by adopting policies that stipulate the use of utilities to completely and securely remove data from storage devices before they are eliminated from the corporate environment. By adopting a sound policy and using free open source data erasing utilities, an organization can mitigate the threat of breaking data confidentiality. In addition to mitigating this threat, companies can opt to donate or sell retired hardware that has been properly sanitized, rather than destroying aging but useful equipment. References 1.Busting the Multipass Erasure Myth by Craig Ball. Law Technology News Wiping Data from Hard Drives by Seth Fogie. informIT Deleted Does Not Mean Gone by Joe Sauver, Ph.D. Computing News Sanitization Methods by Jayson Oertel. Intelligent Computer Solutions. Headlines 1.Sensitive Data Left on Old Hard Drives. Layers Magazine eBay Hard Drives Hold Data by Lucas Mearian. Computerworld &taxonomyId=19&intsrc=kc_top &taxonomyId=19&intsrc=kc_top 3.Skeletons on Your Hard Drive by Matt Hines. Cnet Arrest Over Data-Stuffed Hard Drive Bought on eBay by Out-Law.com References 1.Busting the Multipass Erasure Myth by Craig Ball. Law Technology News Wiping Data from Hard Drives by Seth Fogie. informIT Deleted Does Not Mean Gone by Joe Sauver, Ph.D. Computing News Sanitization Methods by Jayson Oertel. Intelligent Computer Solutions. Headlines 1.Sensitive Data Left on Old Hard Drives. Layers Magazine eBay Hard Drives Hold Data by Lucas Mearian. Computerworld &taxonomyId=19&intsrc=kc_top &taxonomyId=19&intsrc=kc_top 3.Skeletons on Your Hard Drive by Matt Hines. Cnet Arrest Over Data-Stuffed Hard Drive Bought on eBay by Out-Law.com Sanitizing Data From Storage Devices Using a Live CD There are three utilities commonly included on Live CD distributions that can be used to fully remove data from storage devices: wipe, shred, and dcfldd. BackTrack 4 contains all three utilities. Sanitizing Data From Storage Devices Using a Live CD There are three utilities commonly included on Live CD distributions that can be used to fully remove data from storage devices: wipe, shred, and dcfldd. BackTrack 4 contains all three utilities. Why is this an issue? It is a common misconception that once someone deletes a file form a storage media, whether it is a standard hard drive, compact flash card, or a USB flash drive, that the data is gone. In reality, that data has simply been marked by the OS as being “over writable.” This means that the data still resides on the storage device. Even when someone does a standard format of a hard drive the data remains. Because standard deletions and format operations do not completely remove data from storage devices, organizations release unknown amounts of data as they donate, sell, or discard old equipment. Research has shown that used hard drives and devices (including cell phones) can be purchased from any number of vendors and mined for left over data. From a corporate standpoint, allowing storage devices to be released from company control without properly sanitizing the data is a complete breach of data confidentiality. Why is this an issue? It is a common misconception that once someone deletes a file form a storage media, whether it is a standard hard drive, compact flash card, or a USB flash drive, that the data is gone. In reality, that data has simply been marked by the OS as being “over writable.” This means that the data still resides on the storage device. Even when someone does a standard format of a hard drive the data remains. Because standard deletions and format operations do not completely remove data from storage devices, organizations release unknown amounts of data as they donate, sell, or discard old equipment. Research has shown that used hard drives and devices (including cell phones) can be purchased from any number of vendors and mined for left over data. From a corporate standpoint, allowing storage devices to be released from company control without properly sanitizing the data is a complete breach of data confidentiality. Data “Left-overs” in the News People Educate IT Staff about need for data sanitization Train how to use Live CD Tools Technology Choose a Live CD variety Adopt a utility or utilities to handle data removal Hard drives, flash drives, flash storage cards, tapes all need to be sanitized Processes Create / amend security policy concerning the use of Live CD tools for data sanitization. Create / amend procedure to sanitize data from devices upon retirement Figure 1. This figure divides the issues concerning the sanitization of data from corporate devices amongst the three security vulnerabilities: people, process, technology. There are abundant news articles covering the issue of data left on storage devices. Wipe: Utility that overwrites existing data with preset patterns to completely obscure old data so that it may not be accessed again. The utility can be set to overwrite the storage media any number of times. Current research suggests that a single overwrite pass is sufficient to thorough destroy old data, although many still recommend using three passes. Wipe can erase hard drives and any storage device that can be attached to the PC via a USB connection. This utility is thorough but can be time consuming. Shred: Utility that overwrites existing data with random characters to completely obscure old data so that it may not be accessed again. The default number of overwrites for shred is 25, but this can be reduced to improve run time. Shred is more commonly used to completely remove files and directories, although it can remove entire partitions. This means that attached devices may be erased as long as they are mounted as partitions in the operating system. Shred also has the option to do a final pass, overwriting data using only zeroes in order to mask its previous use. dcfldd: An update to the dd utility, most often used to create exact copies of disk images. Dcfldd can do thorough and compete wipes of disks. This utility can overwrite data using a preset pattern and has the ability to verify that all readable data has been obscured. The quick wipe capability of dcfldd functions quicker than wipe and shred. This utility can sanitize hard drives and any other storage devices attached to the PC and mounted within the operating system.