DOC PREVIEW
UCF COT 4810 - Data Remanence

This preview shows page 1-2-3-26-27-28 out of 28 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 28 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 28 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 28 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 28 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 28 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 28 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 28 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Data RemanenceOverviewIntroductionCausesMetadataCountermeasuresOverwritingOverwriting PatternsGutmann MethodDoD StandardsDegaussingEncryptionPhysical DestructionPhysical Destruction MethodsHead CrashingMagnets?Guard DogComplicationsInaccessible Media AreasAdvanced Storage SystemsOptical MediaData In RAMSlide 24OscilloscopesConclusionQuestionsReferencesBrandon OchsOverviewIntroductionCausesCountermeasuresComplicationsIntroductionData remanence is the residual representation of data that has been in some way nominally erased or removedCausesFiles may not be deleted immediatelyMost computers do not remove the contents of a file when deletedEnough metadata may be left behind to restore the fileMetadata“Data about data”Required of effective data managementCountermeasuresClearing requires a lot of effort to recoverPurging cannot possibly be recoveredOverwritingOverwrite the store device with new dataCan be implemented through softwareCan use different overwrite patternsTakes a lot of timeOverwriting PatternsWriting all zerosAlternating ones and zerosComplement or bitwise NOTSome areas of disk may not be accessibleGutmann MethodAlgorithm for erasing hard driveWrite a series of 35 patterns over regionPatterns specific to encoding mechanism ofdriveDoD StandardsOverwriting no longer acceptable methodDegaussing or Physical destructionDegaussingReduction or removal of a magnetic fieldMay purge the entire deviceRenders the hard disk inoperableEncryptionEncrypting can eliminate data remanenceData may be unrecoverablePhysical DestructionGuaranteed to eliminate data remanence if done properlyMost expensive of the techniquesSmall fragments may still contain dataPhysical Destruction MethodsPhysically breaking themedia apart, by grinding, shreddingIncineratingPhase transition (liquification or vaporization of a solid disk)Application of corrosive chemicals, such as acids, to recording surfacesFor magnetic media, raising its temperature above the Curie point (1400F for steel, 800F for most HDD alloys)Head CrashingBad ParkingManual power downModern disks have aretract mechanismMagnets?Consumer-grade magnets don’t cut itStrength of magnet requiredto completely destroy data would bend theplatter and casingGuard DogDeveloped by Georgia Tech Research Instituteuses a 125 pound magnet delivered via hand crankComplicationsInaccessible media areasAdvanced Storage SystemsOptical MediaData in RAMInaccessible Media AreasAreas may become inaccessibleBad sectors on hard drivesMake overwriting ineffectiveAdvanced Storage SystemsMake overwriting ineffectiveEspecially hard to overwrite single filesBuilt in revision controlMay be duplicate dataOptical MediaNon magneticWrite-once media cannot be overwrittenSafest to physically destroyThrow it in the microwave!Data In RAMMay retain data at room temperatureData remains longer at low temperaturesPartial data greatlyreduces search spaceOscilloscopesCan be used to look at hard drive sectorsWrite head is not 100% accuratePeaks and valleys become entrenchedover timeMedia not truly digitalConclusionData is not truly eliminated from media when erasedSafest way is to physically destroyOscilloscopes make overwriting unsafeEncryption is relatively strong, but is susceptible to recovering data in RAMQuestionsWhat is the difference between purging and clearing?What are two DoD acceptable methods for eliminating data?ReferencesPeter Gutmann (July 1996). "Secure Deletion of Data from Magnetic and Solid-State Memory". Retrieved on 2008-4-08.Sergei Skorobogatov (June 2002). "Low temperature data remanence in static RAM". University of Cambridge, Computer Laboratory.Media Destruction Guidance. NSA. Retrieved on


View Full Document

UCF COT 4810 - Data Remanence

Documents in this Course
Spoofing

Spoofing

25 pages

CAPTCHA

CAPTCHA

18 pages

Load more
Download Data Remanence
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Data Remanence and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Data Remanence 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?