2 cissp ® Official Study Guide Eighth Edition


Destroying Sensitive Data



Download 19,3 Mb.
Pdf ko'rish
bet174/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   170   171   172   173   174   175   176   177   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Destroying Sensitive Data 
When an organization no longer needs sensitive data, personnel should destroy it. Proper 
destruction ensures that it cannot fall into the wrong hands and result in unauthorized 
disclosure. Highly classifi ed data requires different steps to destroy it than data classifi ed at 
a lower level. An organization’s security policy or data policy should defi ne the acceptable 
methods of destroying data based on the data’s classifi cation. For example, an organization 
may require the complete destruction of media holding highly classifi ed data, but allow per-
sonnel to use software tools to overwrite data fi les classifi ed at a lower level. 
NIST SP 800-88r1, “Guidelines for Media Sanitization,” provides comprehensive details 
on different sanitization methods. Sanitization methods (such as clearing, purging, and 
destroying) ensure that data cannot be recovered by any means. When a computer is dis-
posed of, sanitization includes ensuring that all nonvolatile memory has been removed or 
destroyed; the system doesn’t have compact discs (CDs)/digital versatile discs (DVDs) in 
any drive; and internal drives (hard drives and solid-state drives (SSDs) have been sanitized, 
removed, and/or destroyed. Sanitization can refer to the destruction of media or using a 
trusted method to purge classifi ed data from the media without destroying it.
Eliminating Data Remanence 
Data remanence
is the data that remains on media after the data was supposedly erased. It 
typically refers to data on a hard drive as residual magnetic fl ux. Using system tools to delete 
data generally leaves much of the data remaining on the media, and widely available tools 
can easily undelete it. Even when you use sophisticated tools to overwrite the media, traces 
of the original data may remain as less perceptible magnetic fi elds. This is similar to a ghost 
image that can remain on some TV and computer monitors if the same data is displayed for 
long periods of time. Forensics experts and attackers have tools they can use to retrieve this 
data even after it has been supposedly overwritten. 


Identify and Classify Assets 
173
One way to remove data remanence is with a degausser. A degausser generates a heavy 
magnetic fi eld, which realigns the magnetic fi elds in magnetic media such as traditional 
hard drives, magnetic tape, and fl oppy disk drives. Degaussers using power will reliably 
rewrite these magnetic fi elds and remove data remanence. However, they are only effective 
on magnetic media. 
In contrast, SSDs use integrated circuitry instead of magnetic fl ux on spinning plat-
ters. Because of this, degaussing SSDs won’t remove data. However, even when using other 
methods to remove data from SSDs, data remnants often remain. In a research paper titled 
“Reliably Erasing Data from Flash-Based Solid State Drives” (available at
www.usenix.org/
legacy/event/fast11/tech/full_papers/Wei.pdf
 ), the authors found that none of the 
traditional methods of sanitizing individual fi les was effective. 
Some SSDs include built-in erase commands to sanitize the entire disk, but unfortu-
nately, these weren’t effective on some SSDs from different manufacturers. Due to these 
risks, the best method of sanitizing SSDs is destruction. The U.S. National Security Agency 
(NSA) requires the destruction of SSDs using an approved disintegrator. Approved disinte-
grators shred the SSDs to a size of 2 millimeters (mm) or smaller. Many organizations sell 
multiple information destruction and sanitization solutions used by government agencies 
and organizations in the private sector that the NSA has approved. 
Another method of protecting SSDs is to ensure that all stored data is encrypted. If a 
sanitization method fails to remove all the data remnants, the remaining data would be 
unreadable. 
Be careful when performing any type of clearing, purging, or sanitization 
process. The human operator or the tool involved in the activity may not 
properly perform the task of completely removing data from the media. 
Software can be flawed, magnets can be faulty, and either can be used 
improperly. Always verify that the desired result is achieved after perform-
ing any sanitization process.
The following list includes some of the common terms associated with destroying data: 

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   170   171   172   173   174   175   176   177   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish