Media Sanitization How to get rid of unwanted data so no one else can get it.

Slides:



Advertisements
Similar presentations
Pennsylvania BANNER Users Group 2007 Disaster Recover For The Financial Aid Environment.
Advertisements

ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Chapter 4 Storing Information in a Computer Peter Nortons Introduction to Computers.
Chapter 4 – Page 1QM-130Dr. Sulaiman Al-Rafee Chapter 4 – Storage Chapter Summary Properties of Storage Systems Magnetic Disks Optical Disks Other types.
AS ICT. Identify suitable uses of common storage media understand the types of access and access speeds required for each use (e.g. serial/sequential,
Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
Identification and Disposition of Official University Records University of Texas at Arlington Records Management.
Gaucho Round-Up FAQ’s This presentation covers some of the FAQ’s about campus clean-up day. Presentation #4 2/3/
CIT In this chapter you will learn how to:  Care for the external parts of the computer  Describe methods for keeping the inside of the case problem-free.
Backing Up Your Computer Hard Drive Lou Koch June 27, 2006.
A dialogue with FMUG: Sensitive Data & Filemaker MIT Policy and Data Classifications ** DRAFT ** Guidelines Feedback and Discussion Tim McGovern 2 June.
1 X-Ways Security: Permanent Erasure Supervised By: Dr. Lo’ai Tawalbeh Prepared By :Murad M. Ali.
Best Practices: Provisioning, Encryption and Decommission of storage in the enterprise.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
Securing NPI Mary Schuster Mike Murphy.  Gramm-Leach-Bliley Act Enacted to control the ways that financial institutions deal with the private information.
Service Point 5 ReportWriter How to create and run reports in ReportWriter.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Disk Clearing and Disk Sanitization
Records Management at UW-Green Bay Or, I am out of space and just want to throw some things away!
Agenda Safe disposal practices for computers and information: –Removing files and folders –Disposing of computers –Disposing of other electronic devices.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Windows Overview LEIT 429x Steve Builta. Where we are going… Overview of operating Systems Overview of Windows 9x Take and Edit digital Photos.
Presentation by Neil Schmidt. Before You Start, Get Organized! On your old computer: Create “Music”, “Pictures” & “Videos” folders (if they don’t already.
COMPUTER BACKUP A disaster will happen to you one day…an accidentally deleted file, a new program that caused problems or a virus that wreaked havoc, wiping.
Data Elimination 101. What Does Degauss Mean? Computer hard drives use magnetic fields to store data on special discs called platters. Degaussing is the.
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
10 Essential Security Measures PA Turnpike Commission.
Chapter 3: Storage Devices & Media ALYSSA BAO 1. 2 Solid State controls movements of electrons within a microchip Optical uses precision lasers to access.
Identify a few method to dispose of the hard drive of computers.
Equipment Surplus & Secure Media Destruction Michael Thorn, Data Security Specialist.
Chapter 4: Operating Systems and File Management 1 Operating Systems and File Management Chapter 4.
Hierarchical file system Hierarchical file system - A hierarchical file system is how drives, folders, and files are displayed on an operating system.
Data Deletion and Recovery. Data Deletion  What does data deletion mean in your own words?
National Property Management Association Disposing of Assets Containing Sensitive Information Kim Doner, CPPM SRA International.
Basic Records Management. What we’ll cover Virginia Public Records Act Definitions Understanding and using the LVA General Schedules The schedule cover.
Policies and Procedures Deb Bartlett Joy Faerber Office of Procedures, Records, and Forms Revised May 2015.
Accounting Electronic Records Management Process Your Company Name Here. Confidential. Revision # ___. Date: _____ By: _______________ 1 1. Full Access.
ESCCO Data Security Training David Dixon September 2014.
March 2013 LCCU Meeting Judy Grindle will discuss and demonstrate: –How can you securely clean off files and programs from a PC before donating it, or.
CHAPTER 7 Storage Katie Moody Storage Storage holds data, instructions, and information for future use. Every computer uses storage to hold software.
Chapter 4 Solving Data Backup Challenges Prepared by: Khurram N. Shamsi.
INFO1 – Practical problem solving in the digital world
Active KillDisk © v3.0 Active Data Security Solutions.
Ways to organize electronic files Witness fitness By: Simran and Navneet.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
Ecords Management Records Management Paul Smallcombe Records & Information Compliance Manager.
Data Destruction Is it really gone? Donna Read Chris Parker Florida Gulf Coast ARMA Chapter April 2013.
Backup Procedure  To prevent against data loss, computer users should have backup procedures  A backup is a copy of information stored on a computer.
Tampa Computer Recycling. Our Tampa computer recycling company takes responsibility of safely disposing of all older computer systems and their electronic.
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
WE ARE DATA By Hazim Zaidani Do you really think that your personal data is protected ? Well… Think Again !!!
 You always need to have the latest anti- virus software so that you can prevent picking up unwanted virus’.  To prevent receiving junk mail, being.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Records Management: The Public Records Act, the Library of Virginia, and You Glenn Smith Records Management Analyst.
DESIGN TOOLS Flowcharts FLOWCHARTS Flowcharts can be used to indicate the essential procedures that are to be employed to create the solution and generate.
PCI-DSS: Guidelines & Procedures When Working With Sensitive Data.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
ICT Unit 3 Storage Devices and Media. What is backing up of data? Backing up refers to the copying of file to a different medium It’s useful if in case.
Environmental Symposium Data Security And Destruction Issues A.K.A. - Disk Sanitization Mike Caltabiano Environmental Protection Agency, Office of Environmental.
Information Management and the Departing Employee.
Protecting PHI & PII 12/30/2017 6:45 AM
Overview and Requirements
Mysale Information Classification 101
McGraw-Hill Technology Education
File Managements.
Mysale Information Classification 101
McGraw-Hill Technology Education
UD PCI GUIDELINES A guide for compliance with PCI DSS and the University of Delaware Payment Card Program ALWAYS Process payments immediately using a solution.
Presentation transcript:

Media Sanitization How to get rid of unwanted data so no one else can get it

Do You Have Sensitive Data Excel spreadsheet of names, addresses, phone numbers, SSN’s and credit card numbers Full database dump of KEAS or SIS Full time or student evaluations with names and SSN’s Financial data – departmental or personal Contacts in Outlook with addresses, s, phone numbers and birthdays Any credit card transactions – customers or purchases Web forms accepting eID and password Saved usernames and passwords for websites, e.g. banks, retirement fund Blueprints for constructing a nuclear weapon

K-State Policy Draft policy on computer disposal:.085 Disposal of Computers and Electronic Media After local disposition has been authorized, it is the responsibility of the department to ensure that all information is removed from computers and electronic media (e.g., magnetic tapes, CDs, DVDs, hard drives, diskettes, ZIP drives, USB drives, etc.) by physically destroying the media or overwriting the data utilizing approved data destruction procedures before it is disposed of by the department. If the surplus computer is to be transferred to another entity for continued use, the license(s) for any software remaining on the computer, such as the operating system, must be transferable to the receiving department in order to maximize the value of the computer and ensure compliance with software license agreements. It is the responsibility of the transferring department to make sure no other copies are retained unless allowed by license agreements.

What can I do with it Keep it forever Throw it away Erase it Erase it securely – reuse media Erase it securely – don’t reuse media Destroy it Keep in mind that technology is constantly changing, take everything you hear with a grain of salt

Keep it forever A lot of people actually do this Easy and inexpensive Doesn’t get rid of it Someone gets to clean up the mess eventually

Throw it away Easy and inexpensive Be absolutely certain that there is no sensitive data on the device Almost impossible to guarantee – violation of policy

Erase it Drag all documents to recycle bin Empty recycle bin Format drive Sufficient to hide data from the casual looker Doesn’t remove data, just pointers in the file table Easy to recover data – Restorer 2000

Erase it securely – reuse media Usually a software based solution DBAN, Eraser, KillDisk Leaves the drive functional / reusable Options to meet most stringent guidelines (DOD, NIST) Device must be functional to begin with Time consuming Requires some tools and knowledge

Erase it securely – don’t reuse media Use a magnetic field to “scramble” magnetic domains on substrate Garner HD-1(~$2000), degaussing ring May be used on any magnetic media – hard drives, tapes, floppy disks, etc. Generally destroys device (R/W heads) or erases low-level format – device unusable Potentially damaging to nearby devices Doesn’t work with optical media – CD’s, DVD’s

Destroy it Medium duty cross-cut shredder or microwave for CD’s, DVD’s Incinerate floppy disks Fast, inexpensive Doesn’t work for HD’s Dangers – toxic fumes or hazardous waste, fire hazard

Destroy it, page 2 Crush HD’s – EDR Disk Crusher $11,500 Drill or Cut HD’s – drill press or table saw with carbide tipped blades – the more tracks you sever the better Shred and/or melt HD’s –SEM Model 22 HDD - $50,000+, 3600 lbs. –Outsource ~$7/drive – sending drive off-site

Resources Darik’s Boot and Nuke Eraser KillDisk Garner HD EDR Disk Crusher SEM Model 22-HDD NIST Guidelines