• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Use the Internet to find ways that some companies currently destroy their data before discarding their computers. Next, locate at least three programs that permanently can destroy data on a hard disk. Finally, prepare a report recommending to your instruc

Extracts from this document...

Introduction

CSC 208                INDIVIDUAL ASSIGNMENT

image02.jpg

image03.jpg

CSC208

INFORMATION TECHNOLOGY FOR BUSINESS

 (1K1)

SESSION JAN 2012

Name                : Yen Zhuo Sheng

I/D No                : I11008652

Lecturer        : Chong Fong Kim

Programme        : BMAUH

Due Date        : 26-02-2012


Assessment Criteria

Total Marks

Given Marks

1.

Introduction

10

2.

Relevant literature review/background study

20

3.

Discussion of the requirements

30

4.

Conclusion

10

5.

Proper referencing (Citation and references)

20

6.

Report Format (i.e. indentation, readiness, Table of Contents, page numbering, header, appendix)

10

100

Late Submission

Penalty

Extra credit (CD)

10

Total

Final Mark

(10%)

Lecturer’s Comments

 Penalty for late submission:  

1 day – minus 20% of total mark awarded

2 days – minus 50% of total mark awarded

3 days – 0 mark for this piece of coursework

TABLE OF CONTENTS

No.

Topic

Page Number

1

Topic Description

4

2

Introduction

5

3

Contents

3.1 Ways to destroy the data before discarding the computer

6 – 7

3.2 Programs that can permanently destroy data on a hard disk

8 – 13

4

Conclusion

14

5

Recommendation

15

6

References

16


  1. TASK GIVEN

Topic #5

Most companies and government agencies make extensive efforts to protect the data and information stored on their computers. When a computer reaches the end of its useful life, it either is recycled or thrown away. Although the obsolete computer does not perform well, if at all, the data on hard disk often is intact. For this reason, companies and government agencies take precautionary measures to remove the data and information so that someone else cannot recover it and use it for malicious purposes. Use the Internet to find ways that some companies currently destroy their data before discarding their computers. Next, locate at least three programs that permanently can destroy data on a hard disk.

...read more.

Middle

        However, there is a time when the computer will reach the end of its useful life. Normally, people will either recycle it or throw it away. Although the obsolete computer does not perform well, if at all, the data on hard disk often is contact. Now, here comes the main question which we should ponder. What should we do with those valuable data?

        Most of the time, people choose to take precautionary measures to remove the data and information so that someone else cannot recover it and use it for malicious purposes. In this assignment, we are going to look into the issue by studying the ways that companies destroy their data before they discard their computers. Also, we are going to conduct a research on those common programs that people prefer to use to destroy the data on a hard disk.


  1. CONTENTS
  1. WAYS TO DESTROY THE DATA BEFORE DISCARDING THE COMPUTERSimage00.png

If you are going to replace out-dated computers, servers, or storage media, like tapes, it is necessary to purge all the business data that currently exists on those devices as stated by Martin (2011). According to Martin (2011), destroying data needs you to go beyond simply dragging a folder on your desktop to the trash can.

Martin (2011) states that according to a chapter on security considerations in the National Institute of Standards and Technology (NIST) Handbook, three are three techniques commonly used for data sanitization: overwriting, degaussing and, destruction.

...read more.

Conclusion

DARIK'S BOOT AND NUKE (DBAN) will be my first option to be considered if I am going to use a program to permanently remove the data from my computer. I prefer DBAN because it is easily obtained from the internet, as people can simply download it for free from the official website.  Let’s say if we encounter any problems while using it, there’s an online forum available. The forum allows people to carry out discussion and exchange opinions before and after using DBAN.


  1. References

1. CBS Interactive, 2011. Active@ Kill Disk – Hard Drive Eraser. [online] Available at: <http://download.cnet.com/Active-Kill-Disk-Hard-Drive-Eraser/3000-2092_4-10073508.html>. [Accessed 20 February 2012]

2. Darik’s Boot And Nuke, n.d.. About DBAN. [online] Available at: <http://www.dban.org/about>. [Accessed 20 February 2012]

3. Eraser, 2010. Eraser. [online] Available at: <http://trac.heidi.ie/>. [Accessed 21 February 2012]

4. Heather, heatheracton., 2010. Review of Active@ Kill Disk Hard Drive Eraser. HeatherActon At the Intersection of Mom & Web Entrepreneur, [blog] 24 February. Available at: <http://heatheracton.com/review-of-active-kill-disk-hard-drive-eraser/>. [Accessed 22 February 2012]

5. Online Tech Tips, 2011. Securely Erase Data from Internal or External Hard Drives on Windows or Mac. [online] Available at: <http://www.online-tech-tips.com/computer-tips/securely-erase-data-from-internal-or-external-hard-drives-on-windows-or-mac/>. [Accessed 20 February 2012]

6. PCHELL, n.d.. Deleting Hard Drive Data vs. Physically Destroying Hard Drive. [online] Available at: <http://www.pchell.com/hardware/destroyingdataonaharddrive.shtml>. [Accessed 22 February 2012]

7. The New York Times, 2005. Deleted but Not Gone. [online] Available at: <http://www.nytimes.com/2005/11/03/technology/circuits/03basics.htm>. [Accessed 21 February 2012]

8. Ultimatebootcd, n.d.. How To: Use DBAN on UBCD to Wipe a Hard Drive. [online] Available at: <http://www.ultimatebootcd.com/dban.html>. [Accessed 21 February 2012]

image01.png

...read more.

This student written piece of work is one of many that can be found in our University Degree Information Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Information Systems essays

  1. This research is about Management of network operating system at Natural Forest Resources management ...

    Though the kernel contributors and maintainers work hard at keeping the kernel up to date, Linux does not have as much of a corporate backing as alternative operating systems. Sometimes you can find third party applications, sometimes you can't. Alternative Programs - Though Linux developers have done a great job

  2. Systems Life Cycle. The main disadvantage of the traditional waterfall method is with the ...

    Techniques 3.5.1 CASE Tools CASE tools enable automation of much of a system's development and can better adjust to changes in user requirements. Importantly, by enabling the modelling of systems using standardised notations and techniques, a CASE tool can often produce prototype code to help programmers.

  1. The purpose of this paper is to provide an analysis of Cisco Systems primary ...

    As all major businesses come to rely on their networks to transact business they too will demand new products and services. Currently, the majority of the dominate companies in the network equipment industry in the United States have gone global.

  2. Network Proposal. Androsia Superior Fabrics has solicited the services of ML-DD IT Consultants ...

    the highest-performance connectivity for mission-critical mobility and performance protection for reliable application delivery. Details of the network upgrade physical and logical design for Androsia Superior Fabrics are illustrated below: Physical Diagrams Logical Diagrams Network Access Policies Branch employee will have access to the following servers: * Web server * Storage

  1. Happy Holidays Hotel. Information Systems Analysis and Design. When we design the new ...

    Happy Holidays Hotel has already got a web system set up, so it shouldn't be hard to integrate a reservation system into that. In the current system, much of the work is done as hard copies, but this has become too complicated with the new rooms and facilities.

  2. RFID and GPS in Business

    Trying to imagine what if the tasks of tracking and identifying items were done by human being. It is sure that there would be many mistakes created and then people have to do the whole process again and again. This leads to the result why people use RFID.

  1. Creating a shopping website with Project management

    Fridays after lectures, this was agreed by all members, but the group also consented to accomplish the work on other days when the deadline close. DFD Diagram Transactions The screen design below shows of how the group want our website to look like.

  2. Organisational Information Systems. In this assignment I have chosen the accounting department, I ...

    A bus network system is centered on one cable which runs as a core. The term bus comes from the language used in describing the system bus on the motherboard. In modern networking the bus is still in se but condensing to the circuitry of a network to be created in a process called micro-segmentation.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work