Gordon Hughes Feb 2004 1 T13 Change Request re Security Erase Gordon Hughes, UCSD Formerly Seagate (until 1997) PI.

Slides:



Advertisements
Similar presentations
Rambling on the Private Data Security
Advertisements

Slow Computer is really an predictable trouble but has the great Solution to set up.
Disclaimer Certain trade names and company products are mentioned in the text or identified. In no case does such identification imply recommendation.
This presentation will take a look at to prevent your information from being discovered by and investigator.
Terms 4 Definitions and Questions. Motherboard The main board of a computer, usually containing the circuitry for the central processing unit, keyboard,
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Chapter 3 Understanding the Boot Process and Command Line.
Basic Input Output System
Mobility for the Enterprise
Format Scandisk Defragmentation Antivirus Compression Software
 Contents 1.Introduction about operating system. 2. What is 32 bit and 64 bit operating system. 3. File systems. 4. Minimum requirement for Windows 7.
Chapter 3 – Computer Hardware Computer Components – Hardware (cont.) Lecture 3.
ENCRYPTION Coffee Hour for August HISTORY OF ENCRYPTION Scytale Ciphers – paper wrapped around rod, receiver needed same size rod to get the message.
Chapter 4: Operating Systems and File Management 1 Operating Systems and File Management Chapter 4.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
Mass Storage Media Locking By Curtis E. Stevens WD.
A COMPUTER is an electronic device. Every computer performs 4 general operations: 1. Input 2. Process 3. Output 4. Storage.
1 Chapter Overview CD-ROM and DVD Drives Advanced Hard Disk Drives SCSI Drives.
Operating Systems Operating System
Internal components, Backing Storage, Operating Systems Software
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Configuring the MagicInfo Pro Display
Hands-On Microsoft Windows Server 2008
Guide to Linux Installation and Administration, 2e1 Chapter 3 Installing Linux.
Chapter 7 Microsoft Windows XP. Windows XP Versions XP Home XP Home XP Professional XP Professional XP Professional 64-Bit XP Professional 64-Bit XP Media.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 5 1 Control Panel Applets.
Tutorial 11 Installing, Updating, and Configuring Software
Computers Are Your Future Eleventh Edition Chapter 4: System Software Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 6 Switch Configuration.
Configuring Windows XP-Based Laptops for Guest Access to Bloomsburg University’s Wireless Network Intended for University staff, and guests planning to.
CHAPTER NT Installation Screens. Chapter Objectives Explain the installation in detail Focus on the three stages of installation Use screen images to.
A+ Guide to Software Managing, Maintaining and Troubleshooting THIRD EDITION Chapter 2 How an OS Works with Hardware and Other Software.
Active KillDisk © v3.0 Active Data Security Solutions.
What is system software and what are its parts? Programs that control operation of computer Two parts are operating systems utility programs.
Bios Utkan Sürgevil
Backup Procedure  To prevent against data loss, computer users should have backup procedures  A backup is a copy of information stored on a computer.
Windows Update A Brief History of Windows & Personal Computing.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
1 Interface Two most common types of interfaces –SCSI: Small Computer Systems Interface (servers and high-performance desktops) –IDE/ATA: Integrated Drive.
Systems Software Operating Systems. What is software? Software is the term that we use for all the programs and data that we use with a computer system.
Chapter 1 Getting Started. 2Practical PC 5 th Edition Chapter 1 Getting Started In this Chapter, you will learn: − How to power up the computer − About.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
 You always need to have the latest anti- virus software so that you can prevent picking up unwanted virus’.  To prevent receiving junk mail, being.
The Operating System ICS3M.  The operating system (OS) provides a consistent environment for other software programs to execute commands.  It gives.
Computer Foundations Dr. John P. Abraham Professor UTPA.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
IST 222 Day 3. Homework for Today Take up homework and go over Go to Microsoft website and check out their hardware compatibility list.
Click once to reveal the definition. Think of the answer. Then click to see if you were correct. HARDWARE Physical parts of the computer.
Chapter 8: Installing Linux The Complete Guide To Linux System Administration.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 29 – The ROM/BIOS.
Chapter 5 Server Installation NT Server Requirements NT Server File Systems Installation.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
Operating System Review
Chapter 1 Getting Started
CS101 Booting A Computer.
Chapter 1 Getting Started
UNIT 9 Computer architecture
UNIT 19 Data Security 2.
Key Terms By: Kelly, Jackson, & Merle
Introduction to Computers
Things To Avoid: 1-Never your password to anyone.
COMPUTER MEMORY & DATA STORAGE
COMPUTER MEMORY & DATA STORAGE
Windows 94
Operating System Review
Booting Up 15-Nov-18 boot.ppt.
Starting the computer. Every day we are using an operating system and most specifically a Windows operating system but most of us are not aware of the.
Chapter Overview CD-ROM and DVD Drives Advanced Hard Disk Drives
Presentation transcript:

Gordon Hughes Feb T13 Change Request re Security Erase Gordon Hughes, UCSD Formerly Seagate (until 1997) PI on NSA Secure Erase R&D program Original requester for SE in T13 and T10 Talk Outline: What SE Change is requested Will it change virus security? Example SE utility showing present problem Background on user benefits of change

Gordon Hughes Feb Request ATA Spec change For Security Freeze Lock command: Remove SE from abort command list, so Secure Erase can be issued by SE utilities, by Windows, and by Unix/Linux Table 10, Security mode command actions Change SECURITY ERASE PREPARE from ABORTED to EXECUTABLE, in Frozen state Change SECURITY ERASE from ABORTED to EXECUTABLE, in Frozen state Virus security will be same as block write SE

Gordon Hughes Feb Example: CMRR Freeware SE Utility HDDerase.exe, a DOS floppy boot utility Downloadable freeware utility from UCSD Runs only from floppy drive (for virus protection) 4 erase options: HDD SE, Fast Erase (with random password), & block write SE (DoD 2550 triple and new DoD) Checks if Security Feature Set is supported Tries to turn it on, if set to off by Device Configuration Checks if drive is Locked or Frozen If Locked, asks user for HDD password If Frozen, HDD SE commands Aborted (ATA spec) Can always SE by block erase (DoD 5220) CMRR working with Microsoft on Windows SE Microsoft using utility for R&D to put SE command in Windows Microsoft is aware of BIOS Freeze Lock problem

Gordon Hughes Feb Why not just block write SE? (DoD 2550) Block erase utilities (PC World May 20, 2003): Summit Computer Hard Disk Scrubber Jetico Inc.'s $40 BCWipe LSoft Technologies Inc.'s $30 KillDisk Pro Not secure per National Security Agency Doesn’t erase reassigned blocks, success not certain HDD SE is up to 3X faster, per CMRR tests Enhanced SE can qualify for NSA secret data DoD 2550 is for unclassified and confidential data only Enhanced SE needs to be implimented and validated

Gordon Hughes Feb CMRR SE Validation Tests Tested 35 ATA & SCSI drives for SE All recent ATA drives SE ok (>10-15 GB) All 4 system board ports, all command combos, Power interrupt leaves drive locked SE doesn’t work if BIOS issues Freeze Lock All SCSI drives don’t SE (optional in T10) Means SATA drives all do SE?

Gordon Hughes Feb Background for Spec change request 2002, Gartner Dataquest: 150,000 hard drives "retired" 2003 Garfinkel and Shelat, in newspapers worldwide and in IEEE Journal of Security & Privacy They bought 158 used hard drives at computer stores and on eBay. 49 contained "significant personal information" Medical correspondence, love letters, pornography,5,000 credit cards. One had a account numbers from a cash machine in Illinois. 2002: Pennsylvania sold computers with state employee information 1997: Arizona pharmacy computer sold with 2,000 customer’s prescriptions. CMRR buys eBay drives for SE tests 1/3 have unerased user data.

Gordon Hughes Feb References “Secure Erase of Disk Drive Data” IDEMA Insight Magazine, Spring 2002 Storage Visions Conference Las Vegas, talk on SE and intelligent storage, January 2003 Letter to Computer World magazine, May 2003 PC World letter, “Secure Erase Project,” October 2003 “Secure Erase” CMRR Newsletter, Summer 2003 DISKCON San Jose talk, Sept 2003