[nflug] Wiping hard drive sensitive personal data
eric
eric at bootz.us
Thu Jul 20 10:37:34 EDT 2006
I often think of all the useless information governments collect to try
and protect themselves from the people.
sad really...
Brad Bartram wrote:
> As with everything, it comes down to a cost / benefit analysis. What
> is the maximum amount that data is worth in comparison to the price it
> would cost to recover? Is it worth enough to have a specific data
> recovery company, or well equipped independent take a serious interest
> in it? Is it somthing that the government would be interested in
> tracking down as part of an anti-terrorism investigation where the
> budget goes beyond what we have as mere mortals?
>
> The ultimate question comes down to the disposition of the drive once
> you're done. If you are trying to reuse the drive after securely
> removing the data, then appropriate measures of data destruction
> should be taken. Example, if the systems will be redeployed
> internally within the same organization and at the same level of
> confidentiality, then use whatever methods you are most comfortable.
> If the systems are to be wiped and redeployed to a level of lesser
> trust, then use a stronger wipe. If the system is going to be taken
> completely out of service, then depending on the data whether it be
> customer information or trade secrets or whatever, you have to decide
> whether to wipe the drive and hope for the best or destroy the drive
> safely.
>
> The only way to be certain that the data on a hard drive is truly
> wiped is to disassemble the drive, chisel the coating from the
> platters, remove the controller from the drive, and burn the case,
> platters, platter dust, and controllers in seperate incinerators. But
> then that just gets a little paranoid. Then again, never
> underestimate the abilities of well funded organizations to recover
> data, even when you think it's destroyed.
>
> brad
>
> On 7/20/06, *Darin Perusich* <Darin.Perusich at cognigencorp.com
> <mailto:Darin.Perusich at cognigencorp.com>> wrote:
>
> i believe it depends on the type of wiping method you use. if you use
> the Canadian RCPM and American DoD standard methods the data is pertty
> much irrecoverable.
>
> eric wrote:
> > Can Sleuth Kit recover data after using one or many of the
> methods DBAN
> > has to offer?
> >
>
> --
> Darin Perusich
> Unix Systems Administrator
> Cognigen Corporation
> 395 Youngs Rd.
> Williamsville, NY 14221
> darinper at cognigencorp.com <mailto:darinper at cognigencorp.com>
> _______________________________________________
> nflug mailing list
> nflug at nflug.org <mailto:nflug at nflug.org>
> http://www.nflug.org/mailman/listinfo/nflug
> <http://www.nflug.org/mailman/listinfo/nflug>
>
>
>------------------------------------------------------------------------
>
>_______________________________________________
>nflug mailing list
>nflug at nflug.org
>http://www.nflug.org/mailman/listinfo/nflug
>
>
_______________________________________________
nflug mailing list
nflug at nflug.org
http://www.nflug.org/mailman/listinfo/nflug
More information about the nflug
mailing list