Data Destruction Methods
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Time
12 hours 57 minutes
Difficulty
Intermediate
CEU/CPE
13
Video Transcription
00:00
>> We are finally at
00:00
the last juncture in our data life-cycle destruction.
00:00
We're going to talk about data destruction methods.
00:00
In this lesson, we're going to talk about
00:00
the primary methods for destroying slash deleting data.
00:00
There is a difference between destruction and
00:00
deletion. We'll go into that.
00:00
Then we're going to also convey
00:00
some of the limitations and
00:00
benefits of each method and then talk
00:00
about proper destruction methods
00:00
that are specific to the cloud context.
00:00
Data destruction methods.
00:00
Destruction is really rendering
00:00
data unable to be accessed, read.
00:00
Deletion may render data
00:00
unable in a state that cannot be read.
00:00
However, it may be recoverable in future.
00:00
We don't necessarily know what technologies
00:00
are coming in the future.
00:00
It's very important to try and destroy
00:00
data properly to prevent some future technology
00:00
to be used to
00:00
discover and identify data that we
00:00
think is quote-unquote deleted.
00:00
But really it's going to be
00:00
retrievable using future technologies and methods.
00:00
The most secure way of
00:00
destroying data is physical destruction of the hardware,
00:00
that it is on and that the disc in that it's saved to,
00:00
or encrypted on is physically destroyed.
00:00
Far as I know, we don't have any way to rewind the clock
00:00
and reassemble a machine
00:00
that's been physically destroyed.
00:00
Now in the cloud contexts,
00:00
because especially if you're
00:00
in a public cloud environment,
00:00
you can't request that the hardware that
00:00
your cloud service provider is using is physically
00:00
destroyed where we actually did I say use rely on
00:00
other methods of physical destruction I should say.
00:00
Now we're going to go over some of
00:00
the traditional methods of
00:00
destruction then talk about the cloud context.
00:00
Physical destruction is the most secure way of
00:00
destroying data and the access
00:00
to it. But then there are other methods.
00:00
Degaussing refers to applying
00:00
a magnet that has a high power of magnet
00:00
to certain hardware which disrupts
00:00
how and renders the information
00:00
unreadable on the disk itself.
00:00
Overriding is the process of,
00:00
as the name would imply,
00:00
writing over the information that's on
00:00
a piece of storage infrastructure with ones and zeros.
00:00
Now, overriding is
00:00
really as an example of data deletion,
00:00
not necessarily data destruction.
00:00
It's important to consider that when it's applied.
00:00
Now in the cloud context, crypto shredding,
00:00
often referred to as crypto-graphic erasure,
00:00
is their main standard for properly destroying data.
00:00
It's really knowing practical method because as we said,
00:00
can just go to
00:00
the data center of your cloud provider and say, hey,
00:00
where's the physical hardware my information
00:00
are on and get permission to destroy it.
00:00
If you have a private cloud,
00:00
you may be able to hire our firm to physically
00:00
destroy the hardware if it belongs to you.
00:00
However, crypto shredding is
00:00
really the most appropriate way of doing this.
00:00
That is really done by simply
00:00
deleting your encryption key used to encrypt the data.
00:00
Once the data has been encrypted and you have the key,
00:00
you want to delete that key as
00:00
well as any other places where the key could be
00:00
maintained if it's in
00:00
a cloud access security broker
00:00
or other third party key management service.
00:00
Basically deleting all the
00:00
keys that can be used to decrypt
00:00
the data ensures that it basically is erased.
00:00
There's no way of accessing the data.
00:00
We can't decrypt it ever.
00:00
Crypto-graphic erasure, crypto shredding,
00:00
that is the main standard for
00:00
deleting data in cloud environments.
00:00
I'm sorry, destroying data in cloud environments.
00:00
Quiz question. What did these deletion method
00:00
is used in public cloud deployments,
00:00
physical destruction, overwriting, crypto shredding?
00:00
As we said, hardware that
00:00
the data is shared across multiple customers,
00:00
physical destruction is out of the picture overriding,
00:00
that is a deletion method,
00:00
but we really want to go for destruction.
00:00
We've really focused on crypto shredding
00:00
as the proper method
00:00
for deleting slash or destroying
00:00
data and public cloud deployments.
00:00
We covered the common methods for
00:00
data deletion and destruction
00:00
and we also talked the most,
00:00
effective methods for deleting data in
00:00
cloud environments.
00:00
>> See you in the next lesson.
Up Next
Instructed By
Similar Content