Time
8 hours 33 minutes
Difficulty
Beginner
CEU/CPE
9

Video Transcription

00:05
security measures for properly disposing of retired data storage devices is crucial to ensure personal sensitive or customer information doesn't get into the wrong hands where it may be exploited. This includes internal and external system devices before they're disposed of repurposed were sold,
00:21
take, for example, in organization undergoing a system upgrade and replacing all old computers with newer models.
00:27
Even though the computers will no longer be in use, the data stored on the hard drive's still exists and is accessible. Basic office or home paper shredders can be used for disposing of optical media, such a CDs and DVDs. There are more powerful shredders that can handle the destruction of larger storage devices like hard drives.
00:45
There are companies that specialize in this type of electronic recycling.
00:49
This type of storage media shredding entails physically breaking the media into small pieces toe where it's deemed unusable, and the data non recoverable, a common drill or hammer can also be used to accomplish physically. Destroying the disk by drilling holes to the disks were hammering it into pieces.
01:06
Incineration used to melt hardware and burn paper into an identifiable pieces
01:10
is another means for ensuring the device is destroyed and data cannot be read from it.
01:15
The contents on a hard drive may also be erased by de magnetize ing it through a process called the Galaxy. The gassing removes all data stored on the drive, including files required for startup, but does not harm the drives. Physical components. This drive will no longer work but can be recycled. Magnetic storage tapes can also be the ghost.
01:34
As an extra layer of security, it is a best practice to shred or incinerate devices after they have been to ghost
01:41
facilities that perform media disposal. Service is can provide a certificate of destruction. Certifying drives have been securely destroyed according to standards, which an organization may need to verify compliance with certain privacy and information handling laws. Not all storage devices need to be fully destroyed. Just the data wiped.
01:57
A hard drive or other storage device may be destined for reuse or recycle.
02:01
In these cases, the drives are formatted or reformatted before being redeployed.
02:07
There are different types of disk formatting. There's a low level format that is completed by the hard drive manufacturer dictating where data is stored on the disk. Prior to shipping to retailers, users would typically perform either a quick or standard format or a regular or long format.
02:22
The quick format, or standard format sets up a new file system and clears the file tables of the drive.
02:28
But all the other data remains and can be accessible if a drive is reused, a long format rewrites the entire partition or logical drive and attempts to fix any bad sectors. In some cases, however, data recovery specialists or applications may still be able to recover data from a storage device that has undergone a long format.
02:46
The process of overriding a Dr SECURELY races the contents of the device by writing zeros to the entire disc,
02:53
wiping the solid state disc, or SST, data recovery specialists or applications may be able to recover data from an overwritten drive. If a storage device is not to be reused, it is recommended to dispose of the device, using one of the physical disposal methods to ensure data is not retrievable. When planning on repurpose ing a previously used storage device,
03:13
methods to destroy or sanitize, also known as purging
03:15
data without harming the disc can be used. There are a few methods that write a series of numbers or random characters to the disc and perform multiple passes of this character. Writing maximum security methods may do 35 passes over the disc writing characters. This overwrite insurance data is destroyed and no longer retrievable
03:35
by data recovery or forensics tools.
03:37
There are free applications available that can perform this wiping or data sanitization to ensure no residual data remains in storage.
03:45
Which data destruction or dr disposal method to use depends on the purposed or desired outcome for both the storage device and data contained on it.

Up Next