26 hours 10 minutes
Hello, everybody. And welcome back in this lecture, we're gonna be talking about destroying data. And what a SoHo is in the security of a SoHo. So let's go ahead and talk about that.
So when you're talking about destruction of data, especially within the A plus really what we're talking about, it's the physical destruction of data that's being held on a hard drive on a solid state drive. One thing to keep in minds when hard drives are being assembled there, assembled in a clean room, which is,
Ah, vacuum sealed. Everyone's wearing a white suit and a mask. There is
no food, no drinks. Everything's dry and it's very clean. If you look up what a clean room looks like, you can see lots of pictures on Google to get you a better idea. So one of the reasons why that they are built in such an environment is because there can't be any dust.
So if you were to open a hard drive and you were to expose the little disc that is within, it looks kind of like a CD. Wrong, Dr
looks kind of like a CD rahm.
It looks kind of like a CD Rome or a DVD Rome. If that information or that disc were to be exposed, the information on the disk would be completely ruined by the dust itself. So the physical destruction of data is very simple, really. You open up the hard drive and you can use a drill or a hammer
to break it open and destroy the disk physically, which is very simple. It's like a
It's almost like glass. It's very easy to break, and that should shatter the information on it all together. You can use a shredder to do that if you don't feel like doing it by hands. There are big machines out there that shred that information and shred the casing up.
You can use electromagnetic destruction, which is called the Gaussian. Make sure you remember that that may be on the exam. I know when I took it Waas,
But yes, electromagnetic destruction is a method of destroying data,
or you could just burn it. You can incinerate it using an incinerator and which is just really big furnace and burn the entire hard drive and recycle the scraps for other metals and stuff like that.
This formatting is another way of destruction of data. It's not as thorough as physical destruction, but it can be used if you need to repurpose the disk for something else. So low level formatting, which is performed by the manufacturer. Basically this you know it rewrites using
bits ends very low level Murray machine level.
You can use a quick format, which can be recovered with really good software. Um, so maybe they're an accidental quick format. If you need to do a recovery, you can ship off your hard drives over to somebody who does that, and they may charge you $1000 or so, depending on how much information is on there that needs to be recovered.
But they could get you a lot of information back for a reasonable price, and it also with a quick format. It sets you up with a new file system in boot sector and all that stuff So
regular format, it's the last one. It overrides everything with zeros, and it cannot be recovered. So this is more of your D o d type. Logical recover.
This is more of your d o d type logical disc formatting. For those of you who you use Mac and used the disc management software within Mac, that is an option. I know Windows has something similar. You guys can do that with either operating system for regular formatting.
But, yes, that kind of gives you a little bit more idea. For those of you are familiar, I just
encourage you to Google it. Do a little bit of reading. You can't have Mac address filtering as an option. Thio only allow certain devices on the network of you needed to. I don't I don't think it's necessary for every case. But if you really, absolutely want to make sure that only certain devices can access your network, Mac address ing is a great way.
Our Mac address filtering is a really good way to prevent
through actress from getting access. Since your network,
you can also sign Manual I p. Address that Sinus versus the HCP DHD. Peace deals with the random distribution of I P addresses, which is all determined by the router itself. But if you set manual I P address assignments to Stern Devices is kind of like Mac address filtering. It only allows her an I P addresses to get access into them.
One thing to keep in mind is that a threat actor can technically spoof either one.
But that would be very difficult for them because they would have to know about your your network set up in order to get a really good guess. Otherwise, that probably wouldn't be worth their time.
Firewalls once again Still Important. It's good to have a network one. If you have a small office in your hope. If you have a small office already have a home office, it's still good to have ah, hardware firewall installed. If not, you can always rely on the software firewalls, which are built into the server and your workstation.
You can disable ports, especially. We have clients coming in and out of your
home office, your small office. You want to make sure you wanted to stable ports that they can't secretly stick of device since your network closet and sniff out Courson for the information over to a remote location. And you can also provide content filtering to make sure that your employees in the small office
or accessing only the content that they need to be accessing and nothing else
so that about wraps up the lecture on destroying data and SoHo security.
If you guys have any questions, feel free to reach out.
CompTIA A+ 220-1001
This CompTIA A+ training covers the 220-1001 exam components needed to earn the CompTIA A+ ...
12 CEU/CPE Hours Available
Certificate of Completion Offered
CompTIA A+ 220-1002
Candidates for the CompTIA A+ Core 1 are vendor-neutral entry-level IT professionals with 12 months ...