• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Use the Internet to find ways that some companies currently destroy their data before discarding their computers. Next, locate at least three programs that permanently can destroy data on a hard disk. Finally, prepare a report recommending to your instruc

Extracts from this document...

Introduction

CSC 208                INDIVIDUAL ASSIGNMENT

image02.jpg

image03.jpg

CSC208

INFORMATION TECHNOLOGY FOR BUSINESS

 (1K1)

SESSION JAN 2012

Name                : Yen Zhuo Sheng

I/D No                : I11008652

Lecturer        : Chong Fong Kim

Programme        : BMAUH

Due Date        : 26-02-2012


Assessment Criteria

Total Marks

Given Marks

1.

Introduction

10

2.

Relevant literature review/background study

20

3.

Discussion of the requirements

30

4.

Conclusion

10

5.

Proper referencing (Citation and references)

20

6.

Report Format (i.e. indentation, readiness, Table of Contents, page numbering, header, appendix)

10

100

Late Submission

Penalty

Extra credit (CD)

10

Total

Final Mark

(10%)

Lecturer’s Comments

 Penalty for late submission:  

1 day – minus 20% of total mark awarded

2 days – minus 50% of total mark awarded

3 days – 0 mark for this piece of coursework

TABLE OF CONTENTS

No.

Topic

Page Number

1

Topic Description

4

2

Introduction

5

3

Contents

3.1 Ways to destroy the data before discarding the computer

6 – 7

3.2 Programs that can permanently destroy data on a hard disk

8 – 13

4

Conclusion

14

5

Recommendation

15

6

References

16


  1. TASK GIVEN

Topic #5

Most companies and government agencies make extensive efforts to protect the data and information stored on their computers. When a computer reaches the end of its useful life, it either is recycled or thrown away. Although the obsolete computer does not perform well, if at all, the data on hard disk often is intact. For this reason, companies and government agencies take precautionary measures to remove the data and information so that someone else cannot recover it and use it for malicious purposes. Use the Internet to find ways that some companies currently destroy their data before discarding their computers. Next, locate at least three programs that permanently can destroy data on a hard disk.

...read more.

Middle

        However, there is a time when the computer will reach the end of its useful life. Normally, people will either recycle it or throw it away. Although the obsolete computer does not perform well, if at all, the data on hard disk often is contact. Now, here comes the main question which we should ponder. What should we do with those valuable data?

        Most of the time, people choose to take precautionary measures to remove the data and information so that someone else cannot recover it and use it for malicious purposes. In this assignment, we are going to look into the issue by studying the ways that companies destroy their data before they discard their computers. Also, we are going to conduct a research on those common programs that people prefer to use to destroy the data on a hard disk.


  1. CONTENTS
  1. WAYS TO DESTROY THE DATA BEFORE DISCARDING THE COMPUTERSimage00.png

If you are going to replace out-dated computers, servers, or storage media, like tapes, it is necessary to purge all the business data that currently exists on those devices as stated by Martin (2011). According to Martin (2011), destroying data needs you to go beyond simply dragging a folder on your desktop to the trash can.

Martin (2011) states that according to a chapter on security considerations in the National Institute of Standards and Technology (NIST) Handbook, three are three techniques commonly used for data sanitization: overwriting, degaussing and, destruction.

...read more.

Conclusion

DARIK'S BOOT AND NUKE (DBAN) will be my first option to be considered if I am going to use a program to permanently remove the data from my computer. I prefer DBAN because it is easily obtained from the internet, as people can simply download it for free from the official website.  Let’s say if we encounter any problems while using it, there’s an online forum available. The forum allows people to carry out discussion and exchange opinions before and after using DBAN.


  1. References

1. CBS Interactive, 2011. Active@ Kill Disk – Hard Drive Eraser. [online] Available at: <http://download.cnet.com/Active-Kill-Disk-Hard-Drive-Eraser/3000-2092_4-10073508.html>. [Accessed 20 February 2012]

2. Darik’s Boot And Nuke, n.d.. About DBAN. [online] Available at: <http://www.dban.org/about>. [Accessed 20 February 2012]

3. Eraser, 2010. Eraser. [online] Available at: <http://trac.heidi.ie/>. [Accessed 21 February 2012]

4. Heather, heatheracton., 2010. Review of Active@ Kill Disk Hard Drive Eraser. HeatherActon At the Intersection of Mom & Web Entrepreneur, [blog] 24 February. Available at: <http://heatheracton.com/review-of-active-kill-disk-hard-drive-eraser/>. [Accessed 22 February 2012]

5. Online Tech Tips, 2011. Securely Erase Data from Internal or External Hard Drives on Windows or Mac. [online] Available at: <http://www.online-tech-tips.com/computer-tips/securely-erase-data-from-internal-or-external-hard-drives-on-windows-or-mac/>. [Accessed 20 February 2012]

6. PCHELL, n.d.. Deleting Hard Drive Data vs. Physically Destroying Hard Drive. [online] Available at: <http://www.pchell.com/hardware/destroyingdataonaharddrive.shtml>. [Accessed 22 February 2012]

7. The New York Times, 2005. Deleted but Not Gone. [online] Available at: <http://www.nytimes.com/2005/11/03/technology/circuits/03basics.htm>. [Accessed 21 February 2012]

8. Ultimatebootcd, n.d.. How To: Use DBAN on UBCD to Wipe a Hard Drive. [online] Available at: <http://www.ultimatebootcd.com/dban.html>. [Accessed 21 February 2012]

image01.png

...read more.

This student written piece of work is one of many that can be found in our University Degree Information Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Information Systems essays

  1. This research is about Management of network operating system at Natural Forest Resources management ...

    Though the kernel contributors and maintainers work hard at keeping the kernel up to date, Linux does not have as much of a corporate backing as alternative operating systems. Sometimes you can find third party applications, sometimes you can't. Alternative Programs - Though Linux developers have done a great job

  2. Systems Life Cycle. The main disadvantage of the traditional waterfall method is with the ...

    Techniques 3.5.1 CASE Tools CASE tools enable automation of much of a system's development and can better adjust to changes in user requirements. Importantly, by enabling the modelling of systems using standardised notations and techniques, a CASE tool can often produce prototype code to help programmers.

  1. The purpose of this paper is to provide an analysis of Cisco Systems primary ...

    As all major businesses come to rely on their networks to transact business they too will demand new products and services. Currently, the majority of the dominate companies in the network equipment industry in the United States have gone global.

  2. Network Proposal. Androsia Superior Fabrics has solicited the services of ML-DD IT Consultants ...

    inventory database * The email server * The backup email server * The web server * Customer database * Backup database Marketing department employees will be able to do the following: * Modify customer information * Modify customer accounts compile reports on customer past purchases * Send out sales newsletters

  1. Happy Holidays Hotel. Information Systems Analysis and Design. When we design the new ...

    Laura Jones owns a computer that could be used instead of the hard copies. The new system would use this computer to produce reservations for the customers and timetables/itineraries for the staff. Organisational Feasibility The staffs' skills are low, so the staffs need to learn how to use the new system, and the new system development staff, etc.

  2. Creating a shopping website with Project management

    Once the admin has clicked on the invoice order a page will appear showing the details of that order. The screen design below shows how the group plan to design this page. Sequence Diagram.vsd Diagram for supplies 4 salons Testing Testing: Design Validation Date: 24/03/2010 Version No: 1 Tester Name:

  1. M2U Case Study

    We have to maintain our name in this field on the top level. The only way we can do that is to stick together, stay loyal and work hard for the company. Why did you start this project? We wanted to know why he started this major project and what his expectations were throughout the plan.

  2. Organisational Information Systems. In this assignment I have chosen the accounting department, I ...

    A bus network system is centered on one cable which runs as a core. The term bus comes from the language used in describing the system bus on the motherboard. In modern networking the bus is still in se but condensing to the circuitry of a network to be created in a process called micro-segmentation.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work