- CONTENTS
-
WAYS TO DESTROY THE DATA BEFORE DISCARDING THE COMPUTERS
If you are going to replace out-dated computers, servers, or storage media, like tapes, it is necessary to purge all the business data that currently exists on those devices as stated by Martin (2011). According to Martin (2011), destroying data needs you to go beyond simply dragging a folder on your desktop to the trash can.
Martin (2011) states that according to a chapter on security considerations in the National Institute of Standards and Technology (NIST) Handbook, three are three techniques commonly used for data sanitization: overwriting, degaussing and, destruction. He adds on by saying that these techniques can be used just as easily by small business as large companies.
- Overwriting your hard drives.
Martin (2011) thinks that overwriting a drive is more than simply selecting a file and deleting it. There is a need for you to overwrite each area of the disk several times and NIST recommends overwriting the hard drive three times (Martin, 2011). There are several programs available to help you overwrite the hard drives, including two freeware utilities, Secure Erase and Eraser (Martin, 2011). However, Martin (2011) believes that overwriting the hard drives is less secure compared to degaussing the storage media.
- Degauss your hard drives and backup tapes.
According to Martin (2011), degaussing means to demagnetize; so, degaussing as a data destruction method magnetically erases data from your magnetic storage media, like hard drives and backup tapes. He further explains that this method generally makes the media unusable after it destroys the data, which is fine when the computers have reached the end of its useful life. If you choose this method to destruct the data, Martin (2011) suggests you to hire a service for either on-site or off-site degaussing. Look for a provider that complies with standards set by both NIST and the as well as any federal legislation that applies to your company, such as the or the (Martin, 2011).
- Destroy your hard drive and backup tapes.
Figure 1.1
Figure 1.2
The most secure way to destroy data according to Martin (2011) is by shredding it, just like your paper documents. The large, industrial shredding machines grind up the storage media into bits of scrap metal which are hardly recognised (Martin, 2011). Please refer to figure 1.1 and figure 1.2. Also, Martin (2011) suggests you to hire a shredding service to come to the company and shred the hard drives under your supervision so that you can be assured that no one accesses any of the data before it is shredded.
- PROGRAMS THAT CAN PERMANENTLY DESTROY THE DATA ON A HARD DISK
- ACTIVE @ KILL DISK
Figure 1.3
According to LSoftTechnologies (n.d.), Active@ KillDisk - Hard Drive Eraser is a powerful and compact software that allows you to destroy all data on hard and floppy drives completely, excluding any possibility of future recovery of deleted files and folders. Also, from the statement made by LSoftTechnologies (n.d.), it is known that this software conforms to US Department of Defense clearing and sanitizing standard DoD 5220.22-M. The most secure Gutmann's data destruction method is also implemented (LSoftTechnologies, n.d.). LSoftTechnologies (n.d.) strongly recommends this FREE software because they have discovered that once this program is run, those sensitive information in the hard drive will be purged out forever.
Heather (2011), an end-user of this program, shares her experience by admitting that this program has the function to ensure the hard drive is blank before reinstalling the OS and other software. There will have no rogue viruses or data hiding on the drive once the Active@ Kill Disk is run (Heather, 2011).
How to use it?
Launch Active Kill Disk using the path Start > All Programs > Active KillDisk > KillDisk for Windows (“Online Tech Tips”, 2011). “ Online Tech Tips” claims that Active@ KillDisk has a minimal interface and is very easy to use. Simply select the hard drive (internal or external) that you want to erase, from the disks menu located on the left side of the screen(“Online Tech Tips”, 2011).
Figure 1.4
According to “Online Tech Tips” (2011), once a drive is selected, the Kill button will become active and just click the Kill button. This will bring up the Kill menu, which lets you select custom preferences for the hard drive erase (“Online Tech Tips”, 2011). Click to check any options that you want and click the Start button. Note that you can also choose an Erase Method:
Figure 1.5
Now, you just have to wait for the disk to format and be written over. After that is done, you will have successfully, and securely, wiped the hard drive (“Online Tech Tips”, 2011).
-
(DBAN)
Figure 1.6
According to J.Fitzgerald (2005), Darik's Boot and Nuke, known also as DBAN, is a free open-source program available at . He further explains that this program runs on Windows computers and offers six methods to overwrite data, including a Defense Department standard (DoD 5220.22-M) that can overwrite the disk three times, as well as a method called PRNG Stream Wipe, which can make a user-defined number of disk overwrites using randomly generated characters.
According to dban.org (n.d.), DBAN is a self-contained boot disk that wipes the hard disks of most computers securely. DBAN will automatically and completely delete the contents of any hard disk that it can detect, which makes it an appropriate utility for bulk or emergency data destruction (dban.org, n.d.). Furthermore, DBAN is a means of ensuring due diligence in computer recycling, a way of preventing identity theft if you want to sell a computer, and a good way to totally clean a Microsoft Windows installation of viruses and spyware (dban.org, n.d.). DBAN was given credits because of its ability to prevent and thoroughly impede all known techniques of hard disk forensic analysis (dban.org, n.d.).
Available in two formats, the program can be burned to a CD or copied to a diskette (J.Fitzgerald, 2005). After a computer is started with either type of disk inserted, DBAN's menu will load. (The computer's boot device order, located in the BIOS, may need to be adjusted to load disk-wiping programs, which run their own operating systems.) (J.Fitzgerald, 2005).
J.Fitzgerald, (2005) thinks that DBAN has won users partly because it is free, but also because of its open-source format. According to Darik Horn (n.d), the program's coding can be scrutinized by anyone, which can help assure reliability. The only official place to obtain DBAN is by download at this web site (dban.org, n.d.).
How to use it?
Philips (2007) states that DBAN is included in the (UBCD). According to Philips, boot from a UBCD bootable CD to start the process and this may involve changing the BIOS options to make the computer boot from CD.
Then, use the menus to select Hard Disk Tools, then Wiping Tools, then Darik's Boot and Nuke (Philips, 2007). Once DBAN has booted, as stated by Philips (2007), you will be presented with the following screen:
Figure 1.7
*Autonuke
To clear any fitted hard drives by using the default options, the easiest option according to Philips (2007) is to type ‘autonuke’. Philips (2007) also mentions that the progress of each hard drive will be displayed in the main, lower part of the screen. Also, Philips (2007) adds to his earlier statement, the time taken, and an estimate of the time remaining will be displayed in the Statistics box. The screenshot below shows DBAN wiping two hard drives:
Figure 1.8
According to Philips (2007), when DBAN is finished, it will display a message similar to the one below:
Figure 1.9
- Eraser
Figure 1.10
According to eraser.heidi.ie (2010), Eraser is a modern security tools which allows people to completely remove sensitive data from the hard drive by overwriting it several times with carefully selected patterns. Eraser is currently supported under Windows XP (with Service Pack 3), Windows Server 2003 (with Service Pack 2), Windows Vista, Windows Server 2008, Windows 7 and Windows Server 2008 R2 (eraser.heidi.ie, 2010). Eraser is free software and its source code is released under (eraser.heidi.ie, 2010).
Eraser.heidi.ie (2010) agrees that there are several problems to secure file removal, mostly caused by the use of write cache, construction of the hard disk and the use of data encoding. However, these problems have been taken into consideration when Eraser was designed, and because of this intuitive design and a simple user interface, people can safely and easily erase private data from the hard drive (eraser.heidi.ie, 2010).
- Conclusion
Nowadays, computer has become a very common commodity item that we can easily get one of it in the market. Therefore, it is a norm for people to make a purchase of a new computer to replace the old one which has been used for few years.
However, before we toss out that old computer or copy machine, it is crucial to make sure that we erase the hard drive completely. This is because a trashed computer is a gold mine for identity and data thieves. Many users still do not realize that their office copier stores documents on a hard drive until the files are overwritten. So unless we take the proper steps to ensure that all data has been erased from a computer or copier before it leaves our office, we may be opening the door to a security breach.
Since there are so many methods that can completely remove the data from the hard drive, simply apply one of them before the computer is discarded.
- Recommendation
For the way to destroy the data before discarding the computer, I personally think that physically destroying a hard drive is by far the most effective method to ensure the safety of the data. However, if you choose this method, it is advisable to wear protective glasses and other gear to keep yourself safe. Also, as a precaution, wrap the hard drive in a towel so the parts don't fly off and do more damage.
There is actually a Do-it-Yourself kit for physically destroying a hard drive called the , it comes with all the tools and things needed to magnetically and physically destroy the hard drive (PCHELL, n.d.).
Whether its smashing the hard drive with a sledgehammer, drilling holes into the drive, tearing the drive apart and destroying the platters, shredding the drive, or any other methods, your sensitive data will be safe. I recommend doing as many of the above procedures (wiping the drive, degaussing it, and destroying it) as you can. If a drive is wiped, degaussed, and destroyed, the chances of recovering the data can almost be rated as nil.
(DBAN) will be my first option to be considered if I am going to use a program to permanently remove the data from my computer. I prefer DBAN because it is easily obtained from the internet, as people can simply download it for free from the official website. Let’s say if we encounter any problems while using it, there’s an online forum available. The forum allows people to carry out discussion and exchange opinions before and after using DBAN.
- References
1. CBS Interactive, 2011. Active@ Kill Disk – Hard Drive Eraser. [online] Available at: <>. [Accessed 20 February 2012]
2. Darik’s Boot And Nuke, n.d.. About DBAN. [online] Available at: <>. [Accessed 20 February 2012]
3. Eraser, 2010. Eraser. [online] Available at: <>. [Accessed 21 February 2012]
4. Heather, heatheracton., 2010. Review of Active@ Kill Disk Hard Drive Eraser. HeatherActon At the Intersection of Mom & Web Entrepreneur, [blog] 24 February. Available at: <>. [Accessed 22 February 2012]
5. Online Tech Tips, 2011. Securely Erase Data from Internal or External Hard Drives on Windows or Mac. [online] Available at: <>. [Accessed 20 February 2012]
6. PCHELL, n.d.. Deleting Hard Drive Data vs. Physically Destroying Hard Drive. [online] Available at: <>. [Accessed 22 February 2012]
7. The New York Times, 2005. Deleted but Not Gone. [online] Available at: <>. [Accessed 21 February 2012]
8. Ultimatebootcd, n.d.. How To: Use DBAN on UBCD to Wipe a Hard Drive. [online] Available at: <>. [Accessed 21 February 2012]