Descarte Seguro De Mídias De Armazenamento

Total Page:16

File Type:pdf, Size:1020Kb

Descarte Seguro De Mídias De Armazenamento DESCARTE SEGURO DE MÍDIAS DE ARMAZENAMENTO: COMO PRESERVAR SUA PRIVACIDADE E ECONOMIZAR RECURSOS RAPHAEL LEONARDO BERNARDO DE SOUZA Pós-graduado, Lato Sensu, de Especialização em Comunicações 1 INTRODUÇÃO RESUMO: ESTE TRAbAlhO ESTá INSERIDO A gestão está no centro do funciona- NA áREA DE ESTUDO DA GESTÃO, NA lINhA DE mento das instituições, pois atua em áreas PESqUISA DA MANUTENÇÃO DOS MATERIAIS DE COMUNICAÇõES E ElETRôNICA. TEM POR fundamentais para o alcance dos objetivos or- PRINCIPAl ObjETIVO ANAlISAR OS PROCEDIMENTOS ganizacionais, como a gestão do material e da UTIlIZADOS NO 4° bATAlhÃO DE COMUNICAÇõES informação, que infuenciam diretamente na dis- (4°bCOM), bEM COMO PROPOR MElhORIAS NO ponibilidade e na racionalização de recursos. PROCESSO DO DESCARTE SEGURO DAS MíDIAS INFORMáTICAS qUE ARMAZENAM INFORMAÇõES Essas áreas estão intrinsecamente as- CORPORATIVAS. EMbORA hAjA ORIENTAÇÃO PARA sociadas ao tratar-se dos materiais de informáti- UTIlIZAÇÃO DE SOFTwARE qUE ElIMINE OS DADOS ca, cuja utilização aumentou a partir da década DEFINITIVAMENTE, FAlTA INDICAÇÃO DE APlICATIVO de 1980, o que ocasionou a gradativa migração PADRÃO PARA ESTA FINAlIDADE. ASSIM, ESTE dos documentos para o formato digital. ESTUDO ANAlISA AS OPÇõES, NA bUSCA POR UM PROGRAMA CONFIáVEl PARA SANITIZAÇÃO DESSAS Nesse panorama, os meios tecnológicos MíDIAS, CONSIDERADA A POSSIbIlIDADE DE destacaram-se ao possibilitarem o armazena- REUTIlIZAÇÃO DAS MESMAS. PARA ISSO, REAlIZA mento de grandes volumes de informações em UMA PESqUISA ExPlORATóRIA, qUE AbORDA OS suporte digital e a recuperação ágil de conteú- TIPOS DE DISPOSITIVOS DE ARMAZENAMENTO, dos. (SILVA, 2015). O FUNCIONAMENTO DO SISTEMA DE ARqUIVOS E A SANITIZAÇÃO DAS MíDIAS INFORMáTICAS. EM Contudo, o uso crescente de documen- SEGUIDA, POR MEIO DE UM qUESTIONáRIO, COlETA tos digitais requer uma atenção especial ao des- INFORMAÇõES SObRE OS PROCESSOS ExECUTADOS carte das mídias de armazenamento, para não NO 4°bCOM. POR FIM, REAlIZA ExPERIMENTOS comprometer a confdencialidade das informa- NO SISTEMA OPERACIONAl lINUx PARA ExClUSÃO ções sigilosas. DE ARqUIVOS DE TExTO EM DISPOSITIVOS MAGNéTICOS E ElETRôNICOS. ENTÃO, APONTA A A cartilha emergencial de segurança de FERRAMENTA ShRED COMO A MAIS ADEqUADA EM tecnologia da informação e comunicações do COMPARAÇÃO A blEAChbIT E wIPE. AléM DISSO, Exército Brasileiro instrui que os discos rígidos VERIFICA qUE OS PROCEDIMENTOS ExECUTADOS sejam formatados com software que elimine os NO 4°bCOM GARANTEM O DESCARTE SEGURO dados defnitivamente, mas não indica um apli- DOS MATERIAIS qUE ARMAZENAM INFORMAÇõES CORPORATIVAS. CONClUI-SE qUE ESTE TRAbAlhO cativo padrão para essa fnalidade. Dessa lacu- CONTRIbUI PARA A GESTÃO DA INFORMAÇÃO, na na padronização dos procedimentos, surge a AO DISPONIbIlIZAR UM MéTODO PARA A EFETIVA necessidade de apontar um utilitário confável, ElIMINAÇÃO DE DOCUMENTOS, E PARA A GESTÃO razão que justifca este estudo. DO MATERIAl, AO POSSIbIlITAR A REUTIlIZAÇÃO DOS DISPOSITIVOS DE ARMAZENAMENTO. Este trabalho trata sobre o descarte se- guro dos materiais que armazenam informações PAlAVRA-ChAVE: GESTÃO DA INFORMAÇÃO. corporativas, com foco nas ferramentas de lim- GESTÃO DO MATERIAl. INFORMAÇõES CORPORA- peza defnitiva de seus conteúdos. TIVAS. DESCARTE DE MíDIAS INFORMáTICAS. SO- bRESCRITA DE DADOS. O ambiente de referência para este trabalho foi o 4° Batalhão de Comunicações (4°BCom) e o estudo limita-se ao sistema D I O R A A M E A D D E O B R U E L S C E S S E C O Õ Ç L A A C I D E 14 N U C O M operacional Linux Ubuntu, homologado para A revisão da literatura possibilitou o em- uso nas estações de trabalho do Exército basamento teórico necessário para responder Brasileiro. Limita-se ainda à sanitização de as questões de estudo, abordando os tipos de mídias magnéticas e eletrônicas, por meio dos dispositivos de armazenamento, o funcionamen- aplicativos BleachBit, Shred e Wipe para excluir to do sistema de arquivos e a sanitização das arquivos de texto .odt. mídias informáticas. Assim, formulou-se o problema: as fer- Em seguida, foi elaborado um questio- ramentas de limpeza de conteúdo utilizadas no nário, que foi aplicado à Seção de Informática do 4°BCom garantem o descarte seguro dos mate- 4°BCom, a fm de colher informações concretas riais que armazenam informações corporativas? a respeito dos processos executados naquela Organização Militar (OM). Com suas análises, este trabalho con- tribui para o aprimoramento dos procedimentos A partir dessa base, seguiram-se os ex- empregados pelo 4°BCom no descarte seguro perimentos de laboratório, nos quais utilizou-se das mídias de armazenamento. Pode servir de uma máquina virtual Linux Ubuntu 16.04 LTS, estudo para a elaboração de normas de ação com 10 Gigabytes de disco rígido, 1 Gigabyte para eliminação de dados armazenados em mí- de memória RAM e processador Intel Core i3 dias informáticas, no Exército Brasileiro. Pode 64 bits. Os dispositivos de armazenamento uti- ainda conscientizar os usuários quanto à segu- lizados foram um HD externo de 500GB e um rança das informações particulares. pendrive de 4GB de capacidade, ambos com o sistema de arquivos Ext4. O tipo de arquivo Este trabalho tem como objetivo geral utilizado nos testes foi o .odt, por ser o formato analisar os procedimentos utilizados no 4°BCom padrão para documentos criados no LibreOffce e propor melhorias no descarte seguro das mí- Writer, ferramenta de processamento de texto dias que armazenam informações. do Linux. Os objetivos específcos são: A pesquisa foi realizada entre os meses Identifcar os tipos de mídias que arma- de fevereiro e junho de 2017, possibilitando a zenam informações. comparação de diferentes ferramentas de limpe- za de conteúdo e a verifcação de sua confa- Descrever três ferramentas gratuitas e bilidade, na busca por resultados práticos para seus métodos de limpeza de conteúdo de mídias o descarte seguro de mídias informáticas no informáticas. 4°BCom. Apontar as vantagens e desvantagens metodológicas dos aplicativos avaliados, de- 2 DESENVOLVIMENTO monstrar sua confabilidade e indicar o mais se- guro. 2.1 DISPOSITIVOS DE ARMAZENAMENTO 1.1 PROCEDIMENTOS METODOLÓGI- A utilização dos materiais informáticos COS no armazenamento da informação, em substitui- ção ao papel, trouxe vantagens como diminui- Trata-se de pesquisa exploratória, com ção do espaço físico e agilidade na recuperação objetivo de descrever os tipos de mídias de ar- da informação. mazenamento de informação e as ferramentas Silva (2015) comunica que o registro da apropriadas para a limpeza de seu conteúdo, informação em suporte digital é realizado em di- indicando o procedimento mais seguro, conside- versos tipos de dispositivos, que são classifca- rando a possibilidade de reutilização do equipa- dos em magnéticos, ópticos e eletrônicos. R A D I O A E M mento. A D D E O B R U E L S C E S S E C O Õ Ç L A A C I D E N 15 U C O M 2.1.1 Armazenamento magnético namento e pode ser defnido como uma coleção organizada de informações. Ainda segundo Englander (2011), o ge- Sobre os meios magnéticos, represen- renciamento de arquivos é realizado pelo sis- tados pelas ftas magnéticas, disquetes e discos tema de arquivos, que os identifca e manipula rígidos, Marçula e Benini Filho explicam que: pelos nomes, determina seus requisitos físicos, Os dados são armazenados magne- aloca espaço para armazená-los e mantém in- tizando-se determinados pontos do formações sobre eles, possibilitando sua recu- material magnético, permitindo que os peração. dados sejam mantidos mesmo quan- do o campo magnético de gravação for retirado. Com isso, a leitura pos- Para complementar o entendimento, terior dos dados pode ser realizada Mota Filho explica: detectando-se as correntes induzidas pelos campos magnéticos armazena- Os flesystems possuem duas por- ções básicas: a área de controle e a dos. (2008, p. 123). área de dados. É na área de controle que encontraremos as informações 2.1.2 Armazenamento óptico sobre os diversos arquivos espalha- dos pela partição de disco que contém Quanto ao armazenamento óptico, onde o flesystem. Na área de dados en- contraremos o conteúdo dos arquivos. estão incluídos os CDs, DVDs e discos Blu-ray, (MOTA FILHO, 2012, p. 153) para a gravação e leitura dos dados, são neces- sários drives que utilizam o raio laser, conforme É importante destacar que, embora os destaca Englander: arquivos sejam armazenados fsicamente nos dispositivos, sua visualização pelo usuário ocor- Os dados são armazenados no dis- co na forma de reentrâncias (lands) e re de forma lógica, conforme o sistema de arqui- saliências (pits) em sequência. Essas vos, que cria uma estrutura semelhante a uma são gravadas na superfície do disco tabela de conteúdos, localizando os arquivos máster (mestre) com um laser de alta potência. [...] Um feixe laser é refetido com facilidade. para fora da superfície em relevo do disco à medida que este é girado por Além disso, o flesystem mantém uma um motor. O refexo é utilizado para di- lista de espaço livre, indicando a disponibilida- ferenciar reentrâncias e saliências, e de para alocação de novos itens, e remaneja o estas são convertidas em bits. (2011, espaço de um arquivo excluído, devolvendo-o à p. 257 e 258). lista de espaço livre. 2.1.3 Armazenamento eletrônico Mota Filho (2012) informa que os siste- mas de arquivos mais conhecidos são FAT16, Acerca dessa tecnologia, que inclui os FAT32 e NTFS para o sistema operacional Win- cartões de memória, pendrives e SSDs, Marçula dows e Ext2, Ext3, Ext4, ReiserFS, JFS e XFS e Benini Filho (2008) destacam suas caracterís- para o Linux. ticas de não volatilidade, possibilidade de gravar ou apagar dados por meio de sinais elétricos, 2.3 SANITIZAÇÃO DE MÍDIAS DE ARMAZE- baixo consumo de energia e pouco espaço físi- NAMENTO co ocupado. Ao tratar sobre mídias de armazena- 2.2 SISTEMAS DE ARQUIVOS OU mento de informações, é importante abordar FILESYSTEMS a correta eliminação dos documentos digitais, para impossibilitar a recuperação dos dados.
Recommended publications
  • Youwipe Assurance Test Report by KÜRT .Pdf
    HDD DATA ERASURE ASSURANCE REPORT TR/yw/20-10-22 KÜRT had been asked to process a detailed analysis of YouWipe edition v4.1.93.2010221419-945f40cc data erasure tool capabilities on hard disk drives with data recovery tools. 1. ASSIGNMENT In response to YouWipe engagement KÜRT Data Recovery Lab have performed the test of the erasure capabilities of YouWipe tool on the following HDD devices: 1. Model : Seagate Barracuda ST1000DM003 Serial number: Z1D6GVFS 2. Model: Western Digital WD20EZRX-00D8PB0 Serial number: WCC4M5LSR3A0 2. ACTIVITIES KÜRT test was performed in accordance with data recovery current technological standards and included the procedures considered necessary in the circumstances to obtain a reasonable basis for rendering the last opinion. 3. TEST LEVELS Examination can include different Test Levels in the context of a desired defense against a certain Risk Level (ADISA) or Effort Level (NIST). 1. Test Level 1: NIST Clear, ADISA Risk level 1 (Low) 2. Test Level 2: NIST Purge, ADISA Risk Level 2 (Medium) KÜRT Data Recovery performed the tests on Test Level 1 and Test Level 2. 4. EXAMINATION PROCESS The examination was performed during the period 5 - 21. October 2020 and included the following steps: 1. A special - KÜRT specific - data pattern was written on the HDD’s, filling the full available capacity of the HDD’s. 2. Using YouWipe v4.1.93 software with “EXT HMG Infosec High” HDD Erasure Method, the HDD’s were wiped following the instructions given with YouWipe software. 3. The HDD’s were analyzed on low level (sector by sector) with several KÜRT Data Recovery software tools.
    [Show full text]
  • NIST 800-88 VS Dod 5220.22-M What Is the Best Method?
    ® NIST 800-88 VS DoD 5220.22-M What Is The Best Method? OVERVIEW The DoD 5220.22-M has long been an industry standard when it comes to data sanitization, but drive technology has changed drastically since the standard was last changed in 2006. The more modern NIST 800.88 US government standard has taken the role as the primary erasure pattern for government, military and enterprise. Due to the necessary changes that arrived with SSD and newer drive technologies, Sipi Asset Recovery highly recommends using the current NIST 800.88 for sanitizing all drive types. THE ORIGIN OF DOD 3-PASS WIPE STANDARD The idea that multiple wipe passes are necessary to render ad ta irrecoverable originates in part with a 1996 study published by Peter Gutmann who suggested that data should be wiped up to 35 times. He proposed that data could be recovered using magnetic force microscopy (MFM) and scanning tunneling microscopy (STM) techniques. Gutmann’s study was widely cited and lead to the adoption of the DoD 3-pass wipe as a standard. The Department of Defense 5220.22-M requires 3 overwrites passes (0’s, 1’s, Random) with a 100% verification pass. This standard was last updated in 2006 and in consideration of the pace of advancement in technology this criteria is significantly out of date. Modern hard drives over the last 10-15 years have advanced in technology to the point where the MFM and STM techniques have become obsolete. Specifically, part of Gutmann’s claim was that the head positioning system in hard drives was not precise enough to overwrite new data on top of the exact position of the old data, thus creating the possibility that the old data would remain intact.
    [Show full text]
  • Bitraser File Eraser Fact Sheet
    BITRASER FILE ERASER WORLD'S MOST RELIABLE DATA ERASURE SOFTWARE SIMPLE. SECURE. File Erasure Software Erases Files, Folders & Partitions from PC, Mac, Server IDEAL FOR INDIVIDUAL, HOME USER & ENTERPRISE Reliable Privacy Safeguarding Software To Erase Sensitive & Confidential Data Beyond Recovery BitRaser File Eraser is a privacy safeguarding software that permanently erases files, folders, partitions, Internet history etc. stored on laptop,desktop, server beyond the scope of data recovery. The software meets daily data sanitization requirements of organizations and individuals by erasing data securely. The software allows you to schedule erasure process & maintain detailed log reports of all files deleted for meeting statutory & regulatory compliance needs for data security & privacy – SOX, GLB, HIPAA, ISO27001,EU-GDPR, PCI-DSS. SOFTWARE WITH EXCELLENT CAPABILITIES SECURE FILE & FOLDER ERASURE HIGH SPEED ERASURE Securely erases sensitive files from PC, laptop, Performs high speed simultaneous erasure of mac and server beyond recovery thereby multiple files in the most efficient way. maintaining privacy. ERASES PARTITIONS EMAIL & BROWSER HISTORY ERASURE Ability to safely erase entire logical drives or Wipes emails & browser history and archives partitions without harming applications & residing in any drive/ media / server without operating system files. leaving any traces. REMOVES COOKIES, BROWSER HISTORY CERTIFIED ERASURE & APPLICATION TRACES A certificate is generated to meet statutory and Erase cookies & Internet browser history that regulatory compliances. track your behavior pattern along with most recently used application traces. BITRASER ADVANTAGE Safeguards Unlimited Easy to use Retain Safe & Cost Your Privacy Erasure in a Year Interface OS Files Reliable Effective BITRASER, AN INNOVATION BY STELLAR, THE GLOBAL DATA CARE EXPERTS TRUSTED BY MILLIONS, SINCE 1993.
    [Show full text]
  • Data Erasure on Magnetic Storage
    “HENRI COANDA” GERMANY “GENERAL M.R. STEFANIK” AIR FORCE ACADEMY ARMED FORCES ACADEMY ROMANIA SLOVAK REPUBLIC INTERNATIONAL CONFERENCE of SCIENTIFIC PAPER AFASES 2011 Brasov, 26-28 May 2011 DATA ERASURE ON MAGNETIC STORAGE Mihăiţă IVAŞCU Metra, Bucharest, Romania Abstract: User data is left is left on the hard drives removed from computers and storage systems, creating a data security vulnerability that many users are unaware of. This is mostly due the fact that normal “delete” or “format” commands leave data intact on a user computer. The cardinal rule of computer storage design has been to protect user data at all costs. Disk drives supply primary mass storage for computer systems designed to prevent accidental erasure of data. Techniques such as “recycle” folders and “unerase” commands are common ways that operating systems try to prevent accidental sanitization of user data. Deletion of file pointers is standard to speeds data writing, because actual overwriting of file data is far slower. These measures taken to protect and speed access to user data can make that data vulnerable to recovery by unauthorized persons. There is an urgent need for a capability to reliably erase data and prevent access to data from retired computer hard disk drives for security and privacy reasons. Data sanitization needs arise differently depending upon user application. The current work presents standards for data erasure, most important methods of data sanitization of hard disk drives and presents how a customized method of data erasure can be implemented. Keywords: recycle, data sanitization, recovery, security vulnerability 1. INTRODUCTION 2. COMPLETE ERASURE OF USER DATA When a computer is lost or disposed of, active and discarded data typically remains 2.1 Known methods of “deleting” data.
    [Show full text]
  • Data Erasure Faqs for the U.S. Public Sector
    Data Erasure FAQs for the U.S. Public Sector Blancco has been helping government organizations across the globe reduce risk for over twenty years. As the leader in data erasure software, our solutions are proven to be the most secure and effective on the market. Read on for a list of some of the common questions we receive from U.S. public sector, then reach out to us for additional information on how we can help you improve data security across your organization. Which is more secure – physical destruction or data erasure? While physical destruction is required for many government Again, as NIST explains, “Applying destructive techniques organizations, newer drive technology presents additional to electronic storage media (e.g., flash memory) is also variables that need to be considered to mitigate risk. While becoming more challenging, as the necessary particle degaussing is the cheapest and easiest form of physical size for commonly applied grinding techniques goes down destruction for HDDs, it is incapable of removing data on proportionally to any increases in flash memory storage SSDs or NVMes. Degaussing destroys data by reducing density. Flash memory chips already present challenges or eliminating the unwanted magnetic fields and rendering with occasional damage to grinders due to the hardness of the drive unusable. Flash-based storage such as SSDs or the component materials, and this problem will get worse NVMes are incapable of being degaussed because their as grinders attempt to grind the chips into even smaller data is not stored magnetically. pieces.” As NIST explains, “Destructive techniques for some media Security throughout the full chain of custody can also be types may become more difficult or impossible to apply in an issue.
    [Show full text]
  • Blancco & H3 Secure: Secure Data Erasure on a Global Scale
    ERASURE AS A SERVICE CASE STUDY Blancco & H3 Secure: Secure Data Erasure on a Global Scale Blancco Partners with H3 Secure to Offer International Diversified Investments Company Erasure as a Service (EaaS) Many companies in the MENA region rely solely on physical destruction to destroy information held on outdated or unused IT assets such as laptops, hard drives and mobile phones. But sometimes physical destruction and degaussing aren’t enough to guarantee complete data removal. For example, typical SSD shredding leaves large particles behind that may still contain sensitive data. Additionally, when organizations rely on a 3rd party to transport their assets and destroy them at their facilities, data is at risk of exposure while in transit and prior to destruction. Smart organizations are investing in data erasure—the software-based method of securely overwriting data from any data storage device using zeros and ones onto all sectors of the device—to combat these issues. By overwriting data on a storage device, the data is rendered unrecoverable and achieves data sanitization. Data erasure can be done on-site or remotely, removing the risk of data exposure throughout the process. Data erasure can also be automated to save time, and it works across a wide variety of IT assets—from servers and LUNs to mobile phones and SSDs. Challenge Recently, IT security solutions company H3 Secure was commissioned for a data erasure project by a UAE investments company. The company had legacy IT Assets which needed to be erased and disposed of securely in a timely manner. Before H3 Secure stepped in, the company was storing these assets, including laptops, PCs, storage arrays, printers and other old server equipment in its basement— when it could be reusing, reselling or recycling them.
    [Show full text]
  • Blancco Drive Eraser Free Download Top 5 Best Free Data Wipe Software for Windows [Pros & Cons] | 2021 Recommendation
    blancco drive eraser free download Top 5 Best Free Data Wipe Software for Windows [Pros & Cons] | 2021 Recommendation. How do I wipe my hard drive clean for free ? Do you know what is the best way for data destruction in 2021? Applying Diskpart clean command indeed works. However, it's not the smartest solution for data removal on Windows hard drive, SSD, or external hard drive. To erase data and wipe hard drive for free, you have a better option which is turning to reliable data and hard disk wipe software for help. Here on this page, you are about to learn the top 5 best free data wipe software in Windows 11/10/8/7. Select one and follow its tutorial to learn how to completely wipe computer data on your own now. List of Top 5 Best Free Hard Drive Data Wipe Software | 2021 Recommendation. So what is the best software to wipe a hard drive? When you search hard disk eraser or data wipe software on Google, you'll get too many results from the searching page. To find a suitable one, you'll have to download and try each data eraser or disk wipe software one by one. Taken days and nights, we tested over 50 disk wipe tools, and we listed 5 best of these tools here to help. Check the pros and cons information of each data wipe software and select one to follow its tutorial guide to shred all files and reset your hard drive to its original state immediately: Wipe partition data.
    [Show full text]
  • A Study of Hard Drive Forensics on Consumers' Pcs: Data
    A Study of Hard Drive Forensics on Consumers’ PCs: Data Recovery and Exploitation B. Dawn Medlin Appalachian State University Joseph A. Cazier Appalachian State University One of the first actions to take when getting rid of an old personal computer is to remove all of the files that contain identifying and personal information. Individuals can be surprisingly negligent in this effort. Many individuals may also believe that by simply moving their files to the recycle bin and then emptying that bin that all of their programs and files are permanently erased. If personal information is not totally deleted, acts of identity theft can easily occur. Our research study identified the types of information found and/or recovered from hard disk drives on computers that have been donated to charity, sold second-hand, or otherwise donated to other organizations for reuse. Of the fifty-five hard drives studied approximately 300,000 files contained identifiable information. Results showed the need for further training in relation to total file erasure from a hard drive as well as the negative results such as identity theft that can occur due to this lack of training or knowledge. INTRODUCTION Wiping a computer clean is not as easy as it may appear. Just deleting the personal files and emptying the recycle bin is essentially next to useless. The delete function only removes file names from a directory list and makes the sectors the files occupy on the hard drive available for future use. Meanwhile, these files actually continue to exist. To positively prevent data from recovery, disks can be removed from disk drives and broken up, or even ground to microscopic pieces.
    [Show full text]
  • How Blancco Secure Data Erasure Integrates with Servicenow
    How Blancco Secure Data Erasure Integrates with ServiceNow Blancco has integrated its market leading erasure software, Blancco Secure Data Erasure, with ServiceNow, simplifying and strengthening your IT asset management processes. This integration will help increase your organization’s efficiency and accountability and simultaneously reduce your costs. Blancco Secure Data Erasure can help you achieve this by improving deployment, erasure control, reporting and auditing. Blancco Secure Data Erasure enables you to remotely prepare and trigger the erasure, as well as collect the results and receive certification of the erasure automatically, through the ServiceNow platform, without involving the end user. When a data asset requires erasure - whether an individual device or a server cluster – it is vital that the erasure receives full certification. In recent years there has been a rapid increase in the need to carry out certified erasures of ServiceNow managed IT assets (laptops, desktops, servers etc.) that are due to be retired either due to employee turnover or hardware redundancy. Following a successful erasure, the end user can safely ship the device back to your IT department or other destination as needed, allowing you to extend your devices’ usability lifecycle and value beyond expectations and permit you to resell or repurpose as you see fit. Blancco Secure Data Erasure app on the ServiceNow store The Blancco Secure Data Erasure app on the ServiceNow store enables you to integrate and control your asset erasure directly from ServiceNow. The app provides a view of all managed assets on which you can trigger a remote erasure, allowing you to securely and easily erase devices.
    [Show full text]
  • Data Recovery Data Erasure
    Data Recovery - What is possible to recover and how? Data Erasure - How to erase information in a secure way Åke Ljungqvist, Country Manager Sweden Who is Ibas? • Norway... • Recovery of hard drives after fire exposure... • Unforeseen costs... About Ibas • Founded in 1978 • Owner: Kroll Ontrack • Business areas - Data Recovery - Data Erasure - Computer Forensics • Number of employed (Nordic countries): 68 • World wide (Kroll Ontrack) • Global customer service: 24/7/365 Data Recovery Data recovery – when your backup fails... • Large amounts of data are stored on hard drives • Technology is stressed to its limit in order to squeeze in more data 640 000 A4 binders equals 640 GB of data Data recovery – when your backup fails... • Large amounts of data are stored on hard drives • Technology is stressed to its limit in order to squeeze in more data • Hard drives will crash… • Backup systems fails or are missing • Human errors occurs! Only 50% of the companies in Sweden have procedures for backup of laptops!! PC users are the biggest threat to security!! -98% of the IT managers said that all important data is stored on their servers where the backup is running - 20% of the users said they store data locally on their own hard drive… Data recovery- in practice Data recovery - step by step Analysis Report Order Recovery Delivery Economy Type of Problem Order from Economy TNT 4-6 days Amount of data customer 6-10 days JetPak Standard Delivery time Standard Post 2 days Cost 3-5 days Taxi Express Express Via Internet 7 hours 24 hours All data handling
    [Show full text]
  • NSA/CSS Technical Cyber Threat Framework V2
    NATIONAL SECURITY AGENCY CYBERSECURITY REPORT NSA/CSS Technical Cyber Threat Framework v2 A REPORT FROM: CYBERSECURITY OPERATIONS THE CYBERSECURITY PRODUCTS AND SHARING DIVISION 13 November 2018 U/OO/224896-18 PP-18-0844 NSA CYBERSECURITY REPORT (U) DOCUMENT CHANGE HISTORY DATE VERSION DESCRIPTION 23 OCTOBER 2018 2.0 Original document 24 OCTOBER 2018 2.1 Retemplated document 2 NOVEMBER 2018 2.2 Updated document format. (U) EXECUTIVE SUMMARY (U) The “NSA/CSS Technical Cyber Threat Framework v2” (NTCTF v2) was developed as a technical extension of the Director of National Intelligence Cyber Threat Framework. Designed to standardize how NSA characterizes and categorizes adversary activity by using a common technical lexicon that is operating system independent and closely aligned with industry definitions. This common technical cyber lexicon supports sharing, product development, operational planning, and knowledge driven operations across the Intelligence Community. Public dissemination of the technical cyber lexicon allows for collaboration with whole-of-community. Use of the NTCTF facilitates organizing and examining adversary activity to support knowledge management and enable analytic efforts. (U) The Cyber Technical Report entitled "NSA/CSS Technical Cyber Threat Framework v2” provides a baseline of standard definitions to be used as reference for U.S. Government Collaboration with partners and stakeholders in discussing adversary activities throughout the adversary lifecycle. U/OO/224896-18 PP-18-0844 NOVEMBER 2018 2 NSA CYBERSECURITY REPORT (U) DISCLAIMER OF WARRANTIES AND ENDORSEMENT (U) The information and opinions contained in this document are provided “as is” and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government.
    [Show full text]
  • An Evaluation of Data Erasing Tools
    Journal of Digital Forensics, Security and Law Volume 15 Number 1 Article 2 June 2020 An Evaluation Of Data Erasing Tools Andrew Jones University of Suffolk, [email protected] Isaac Afrifa University of Hertfordshire, [email protected] Follow this and additional works at: https://commons.erau.edu/jdfsl Part of the Computer Law Commons, and the Information Security Commons Recommended Citation Jones, Andrew and Afrifa, Isaac (2020) "An Evaluation Of Data Erasing Tools," Journal of Digital Forensics, Security and Law: Vol. 15 : No. 1 , Article 2. DOI: https://doi.org/10.15394/jdfsl.2020.1615 Available at: https://commons.erau.edu/jdfsl/vol15/iss1/2 This Article is brought to you for free and open access by the Journals at Scholarly Commons. It has been accepted for inclusion in Journal of Digital Forensics, Security and Law by an authorized administrator of (c)ADFSL Scholarly Commons. For more information, please contact [email protected]. Data Erasing Tools JDFSL V15N1 AN EVALUATION OF DATA ERASING TOOLS Isaac Afrifa1, Andrew Jones2 1 2Cyber Security Center, University of Hertfordshire 2Cyber Security CRC, Edith Cowan University [email protected] [email protected] ABSTRACT The permanent removal of data from media is a major area of concern mainly because of the misconception that once a file is deleted or storage media is formatted, it cannot be recovered. There has been the development of both commercial and freeware data erasing tools, which all claim complete file or disk erasure. This report analyzes the efficiency of a number of these tools in performing erasures on an electromechanical drive.
    [Show full text]