[nflug] Wiping hard drive sensitive personal data
Frank Kumro
fkumro at gmail.com
Thu Jul 20 10:05:17 EDT 2006
Ive used DBAN and love it...just my 2 cents
On 7/20/06, Brad Bartram <brad.bartram at gmail.com> wrote:
> As with everything, it comes down to a cost / benefit analysis. What is the
> maximum amount that data is worth in comparison to the price it would cost
> to recover? Is it worth enough to have a specific data recovery company, or
> well equipped independent take a serious interest in it? Is it somthing
> that the government would be interested in tracking down as part of an
> anti-terrorism investigation where the budget goes beyond what we have as
> mere mortals?
>
> The ultimate question comes down to the disposition of the drive once you're
> done. If you are trying to reuse the drive after securely removing the
> data, then appropriate measures of data destruction should be taken.
> Example, if the systems will be redeployed internally within the same
> organization and at the same level of confidentiality, then use whatever
> methods you are most comfortable. If the systems are to be wiped and
> redeployed to a level of lesser trust, then use a stronger wipe. If the
> system is going to be taken completely out of service, then depending on the
> data whether it be customer information or trade secrets or whatever, you
> have to decide whether to wipe the drive and hope for the best or destroy
> the drive safely.
>
> The only way to be certain that the data on a hard drive is truly wiped is
> to disassemble the drive, chisel the coating from the platters, remove the
> controller from the drive, and burn the case, platters, platter dust, and
> controllers in seperate incinerators. But then that just gets a little
> paranoid. Then again, never underestimate the abilities of well funded
> organizations to recover data, even when you think it's destroyed.
>
> brad
>
>
> On 7/20/06, Darin Perusich <Darin.Perusich at cognigencorp.com> wrote:
> > i believe it depends on the type of wiping method you use. if you use
> > the Canadian RCPM and American DoD standard methods the data is pertty
> > much irrecoverable.
> >
> > eric wrote:
> > > Can Sleuth Kit recover data after using one or many of the methods DBAN
> > > has to offer?
> > >
> >
> > --
> > Darin Perusich
> > Unix Systems Administrator
> > Cognigen Corporation
> > 395 Youngs Rd.
> > Williamsville, NY 14221
> > darinper at cognigencorp.com
> > _______________________________________________
> > nflug mailing list
> > nflug at nflug.org
> > http://www.nflug.org/mailman/listinfo/nflug
> >
>
>
> _______________________________________________
> nflug mailing list
> nflug at nflug.org
> http://www.nflug.org/mailman/listinfo/nflug
>
>
>
--
Frank
Shenanigans!!
http://www.syncoder.com
_______________________________________________
nflug mailing list
nflug at nflug.org
http://www.nflug.org/mailman/listinfo/nflug
More information about the nflug
mailing list