• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Use the Internet to find ways that some companies currently destroy their data before discarding their computers. Next, locate at least three programs that permanently can destroy data on a hard disk. Finally, prepare a report recommending to your instruc

Extracts from this document...

Introduction

CSC 208                INDIVIDUAL ASSIGNMENT

image02.jpg

image03.jpg

CSC208

INFORMATION TECHNOLOGY FOR BUSINESS

 (1K1)

SESSION JAN 2012

Name                : Yen Zhuo Sheng

I/D No                : I11008652

Lecturer        : Chong Fong Kim

Programme        : BMAUH

Due Date        : 26-02-2012


Assessment Criteria

Total Marks

Given Marks

1.

Introduction

10

2.

Relevant literature review/background study

20

3.

Discussion of the requirements

30

4.

Conclusion

10

5.

Proper referencing (Citation and references)

20

6.

Report Format (i.e. indentation, readiness, Table of Contents, page numbering, header, appendix)

10

100

Late Submission

Penalty

Extra credit (CD)

10

Total

Final Mark

(10%)

Lecturer’s Comments

 Penalty for late submission:  

1 day – minus 20% of total mark awarded

2 days – minus 50% of total mark awarded

3 days – 0 mark for this piece of coursework

TABLE OF CONTENTS

No.

Topic

Page Number

1

Topic Description

4

2

Introduction

5

3

Contents

3.1 Ways to destroy the data before discarding the computer

6 – 7

3.2 Programs that can permanently destroy data on a hard disk

8 – 13

4

Conclusion

14

5

Recommendation

15

6

References

16


  1. TASK GIVEN

Topic #5

Most companies and government agencies make extensive efforts to protect the data and information stored on their computers. When a computer reaches the end of its useful life, it either is recycled or thrown away. Although the obsolete computer does not perform well, if at all, the data on hard disk often is intact. For this reason, companies and government agencies take precautionary measures to remove the data and information so that someone else cannot recover it and use it for malicious purposes. Use the Internet to find ways that some companies currently destroy their data before discarding their computers. Next, locate at least three programs that permanently can destroy data on a hard disk.

...read more.

Middle

        However, there is a time when the computer will reach the end of its useful life. Normally, people will either recycle it or throw it away. Although the obsolete computer does not perform well, if at all, the data on hard disk often is contact. Now, here comes the main question which we should ponder. What should we do with those valuable data?

        Most of the time, people choose to take precautionary measures to remove the data and information so that someone else cannot recover it and use it for malicious purposes. In this assignment, we are going to look into the issue by studying the ways that companies destroy their data before they discard their computers. Also, we are going to conduct a research on those common programs that people prefer to use to destroy the data on a hard disk.


  1. CONTENTS
  1. WAYS TO DESTROY THE DATA BEFORE DISCARDING THE COMPUTERSimage00.png

If you are going to replace out-dated computers, servers, or storage media, like tapes, it is necessary to purge all the business data that currently exists on those devices as stated by Martin (2011). According to Martin (2011), destroying data needs you to go beyond simply dragging a folder on your desktop to the trash can.

Martin (2011) states that according to a chapter on security considerations in the National Institute of Standards and Technology (NIST) Handbook, three are three techniques commonly used for data sanitization: overwriting, degaussing and, destruction.

...read more.

Conclusion

DARIK'S BOOT AND NUKE (DBAN) will be my first option to be considered if I am going to use a program to permanently remove the data from my computer. I prefer DBAN because it is easily obtained from the internet, as people can simply download it for free from the official website.  Let’s say if we encounter any problems while using it, there’s an online forum available. The forum allows people to carry out discussion and exchange opinions before and after using DBAN.


  1. References

1. CBS Interactive, 2011. Active@ Kill Disk – Hard Drive Eraser. [online] Available at: <http://download.cnet.com/Active-Kill-Disk-Hard-Drive-Eraser/3000-2092_4-10073508.html>. [Accessed 20 February 2012]

2. Darik’s Boot And Nuke, n.d.. About DBAN. [online] Available at: <http://www.dban.org/about>. [Accessed 20 February 2012]

3. Eraser, 2010. Eraser. [online] Available at: <http://trac.heidi.ie/>. [Accessed 21 February 2012]

4. Heather, heatheracton., 2010. Review of Active@ Kill Disk Hard Drive Eraser. HeatherActon At the Intersection of Mom & Web Entrepreneur, [blog] 24 February. Available at: <http://heatheracton.com/review-of-active-kill-disk-hard-drive-eraser/>. [Accessed 22 February 2012]

5. Online Tech Tips, 2011. Securely Erase Data from Internal or External Hard Drives on Windows or Mac. [online] Available at: <http://www.online-tech-tips.com/computer-tips/securely-erase-data-from-internal-or-external-hard-drives-on-windows-or-mac/>. [Accessed 20 February 2012]

6. PCHELL, n.d.. Deleting Hard Drive Data vs. Physically Destroying Hard Drive. [online] Available at: <http://www.pchell.com/hardware/destroyingdataonaharddrive.shtml>. [Accessed 22 February 2012]

7. The New York Times, 2005. Deleted but Not Gone. [online] Available at: <http://www.nytimes.com/2005/11/03/technology/circuits/03basics.htm>. [Accessed 21 February 2012]

8. Ultimatebootcd, n.d.. How To: Use DBAN on UBCD to Wipe a Hard Drive. [online] Available at: <http://www.ultimatebootcd.com/dban.html>. [Accessed 21 February 2012]

image01.png

...read more.

This student written piece of work is one of many that can be found in our University Degree Information Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Information Systems essays

  1. The intention of this study is to analyze and explore the emerging field of ...

    These areas are turning towards grid computing for accessing, collecting and mining large amounts of data. Many scientific tools have been developed that incorporate the use of the grid's resources. These resources include super computers and clusters. Examples of grid projects related to life science include the Protein Data Bank

  2. Systems Life Cycle. The main disadvantage of the traditional waterfall method is with the ...

    The lack of assessing User Requirements before prototyping obviously contributes to this factor. High software and training expenses are also a major disadvantage. 3.3 Suitability The DSDM approach better suits those customers whose requirements are not well recognised and their needs change often, as it is derived from best practice.

  1. The case study I have chosen is Northwestern Business College. Northwestern Business College is ...

    Risks Fix Cost ROI 1. Viruses, Worms, and Trojan Horses * Antivirus Software * Firewall * Content Filtering * eTrust Antivirus 400 users $400. * eTrust Secure Content Manager 400 users $400. * SonicWall Firewall $2,000 per unit multiplied by 4 sites equals $8,000.

  2. The Treasury department is the financial hub of the government of ST. Vincent and ...

    Fiber Optic links Financial System that process trans. CS/DSU units Processing of transactions Smartstream Financial System that process trans. Job Servers Printing of checks and purchase orders Smartstream Financial System that process trans. Switches and routers Processing of transactions Smartstream Financial System that process trans.

  1. Website Design. This is a Texans Credit Union online website. It has recently ...

    Verify that the Request Tax Information is valid and complete 2. Execute Verify Account Information Use Case 3. Retrieve all tax related transactions from all accounts for given year 4. Create properly formatted tax form 5. Send tax form to printer for mailing Exceptional Flows: 1.

  2. The purpose of this paper is to provide an analysis of Cisco Systems primary ...

    In the US, almost all of the network equipment companies are global players and will continue to expand in the future despite recent downsizing. Expansion is focused on regions where network infrastructure is still largely undeveloped like the Middle East, Latin America and Asia.

  1. Organisational Information Systems. In this assignment I have chosen the accounting department, I ...

    Figure.5 Figure.5 Shows all the methodologies that can be used to improve a system, to improve the current system planning and analysis is needed, these methodologies help to improve efficiency which then makes it easier to meet targets/deadlines, and the end result would ensure the need of the end user are met.

  2. Internet Privacy and Security

    This site also points out sites that carry a Better Business Bureau Online or Trusted seal. Both seals indicate that the site has complied with privacy policies, information collection, etc. standards. Surfing online is just what we do now so we even need to be cautious while simply being online especially on wireless networks.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work