Secure Erase of Disk Drive Data

نویسندگان

  • Gordon Hughes
  • Tom Coughlin
چکیده

Consequently, user data often remains stored on disk drives when they are discarded, transferred to another user, or returned off lease. Even if users delete their files, they can be recovered from “recycling” folders or by special programs such as Norton Unerase. Other special programs are available to more definitely erase user data, such as Norton WipeInfo, which offers a “Government Wipe.” Because these are special programs, they are not widely known or used. Additionally, some user data can be unreachable by erasure programs, such as drive data blocks removed from use due to excessive errors. (These blocks are reassigned to other disk locations, and the defective record area is marked unusable in the drive’s “g-list”but the original data can remain in g-list sectors.) Norton WipeInfo only runs on older Windows OS, and wipes an individual folder.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Protecting Drive Encryption Systems Against Memory Attacks

Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memory and consequently decrypts the drive. We reviewed the currently existing mitigations and have found that they provide only partial protection, and none of them protect against the full range of memory attacks. We prop...

متن کامل

Performance and Solidity Schema for NAND Flash Memory-based Solid State Disk

significant attention has been paid to the Flash Memory based Solid State Drive (SSD) which made replacing the existing HDD, used as a storage unit across the world, very possible. Different from traditional disks, SSD uses semiconductor chips to store data. This structure enjoys very original technical characteristics including Low power consumption, shock resistance and high performance in ra...

متن کامل

An Information-Theoretical Analysis of the Minimum Cost to Erase Information

We normally hold a lot of confidential information in hard disk drives and solid-state drives. When we want to erase such information to prevent the leakage, we have to overwrite the sequence of information with a sequence of symbols independent of the information. The overwriting is needed only at places where overwritten symbols are different from original symbols. Then, the cost of overwrite...

متن کامل

Secure Data Deletion for USB Flash Memory

People commonly use USB flash memory because of its convenience and portability. It stores various data such as documents, pictures, certificates, and private data (e.g., passwords, account numbers). These data, especially private data, should not be revealed to the outside. However, even when the stored data is deleted, these data can be recovered using data recovery programs. To prevent this ...

متن کامل

SmSD:A Smart Secure Deletion Scheme for SSDs

Recent years, flash memory based Solid State Drives (SSDs) become a mainstream choice in mobile computers. To protect confidential data from being leaked, users have to run secure software to securely delete the needless files. However the traditional secure deletion software will not work for SSDs. To solve the problem, we proposed a smart secure deletion method called SmSD to clean up the sen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002