US-CERT Cyber Security Tip ST05-011 -- Effectively Erasing Files

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

                       Cyber Security Tip ST05-011
                        Effectively Erasing Files

   Before selling or discarding an old computer, or throwing away a disk
   or CD, you naturally make sure that you've copied all of the files you
   need. You've probably also attempted to delete your personal files so
   that other people aren't able to access them. However, unless you have
   taken the proper steps to make sure the hard drive, disk, or CD is
   erased, people may still be able to resurrect those files.

Where do deleted files go?

   When  you  delete  a file, depending on your operating system and your
   settings,  it  may  be  transferred to your trash or recycle bin. This
   "holding   area"   essentially  protects  you  from  yourself--if  you
   accidentally  delete  a  file, you can easily restore it. However, you
   may  have  experienced  the panic that results from emptying the trash
   bin  prematurely  or  having  a file seem to disappear on its own. The
   good  news is that even though it may be difficult to locate, the file
   is probably still somewhere on your machine. The bad news is that even
   though  you  think  you've  deleted  a  file,  an  attacker  or  other
   unauthorized person may be able to retrieve it.

What are the risks?

   Think  of  the  information  you have saved on your computer. Is there
   banking  or  credit  card account information? Tax returns? Passwords?
   Medical  or  other personal data? Personal photos? Sensitive corporate
   information?  How  much would someone be able to find out about you or
   your company by looking through your computer files?

   Depending  on what kind of information an attacker can find, he or she
   may be able to use it maliciously. You may become a victim of identity
   theft.  Another possibility is that the information could be used in a
   social  engineering  attack.  Attackers  may use information they find
   about  you  or  an organization you're affiliated with to appear to be
   legitimate  and  gain  access  to  sensitive data (see Avoiding Social
   Engineering and Phishing Attacks for more information).

Can you erase files by reformatting?

   Reformatting your hard drive or CD may superficially delete the files,
   but  the  information is still buried somewhere. Unless those areas of
   the  disk  are  effectively  overwritten with new content, it is still
   possible  that  knowledgeable  attackers  may  be  able  to access the
   information.

How can you be sure that your information is completely erased?

   Some  people  use  extreme  measures to make sure their information is
   destroyed,  but  these  measures  can  be  dangerous  and  may  not be
   completely  successful.  Your  best  option is to investigate software
   programs  and  hardware devices that claim to erase your hard drive or
   CD.  Even  so,  these  programs  and  devices  have  varying levels of
   effectiveness.  When choosing a software program to perform this task,
   look for the following characteristics:
     * data is written multiple times - It is important to make sure that
       not  only  is the information erased, but new data is written over
       it.  By  adding  multiple  layers  of  data,  the program makes it
       difficult  for  an attacker to "peel away" the new layer. Three to
       seven passes is fairly standard and should be sufficient.
     * use  of  random  data  -  Using  random  data  instead  of  easily
       identifiable  patterns  makes it harder for attackers to determine
       the pattern and discover the original information underneath.
     * use of zeros in the final layer - Regardless of how many times the
       program  overwrites the data, look for programs that use all zeros
       in the last layer. This adds an additional level of security.

   While  many  of these programs assume that you want to erase an entire
   disk,  there  are  programs  that  give  you  the  option to erase and
   overwrite individual files.

   An  effective  way  to ruin a CD or DVD is to wrap it in a paper towel
   and  shatter  it.  However, there are also hardware devices that erase
   CDs  or  DVDs  by  destroying  their  surface.  Some  of these devices
   actually  shred  the  media itself, while others puncture the writable
   surface  with  a  pattern  of holes. If you decide to use one of these
   devices,  compare  the  various features and prices to determine which
   option best suits your needs.
     _________________________________________________________________

     Authors: Mindi McDowell, Matt Lytle
     _________________________________________________________________

     Produced 2005 by US-CERT, a government organization.

     Note: This tip was previously published and is being re-distributed 
     to increase awareness. 
  
     Terms of use
 
     <http://www.us-cert.gov/legal.html>
  
     This document can also be found at
 
     <http://www.us-cert.gov/cas/tips/ST05-011.html>
 

     For instructions on subscribing to or unsubscribing from this
     mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
     
     
     


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBTD3Iej6pPKYJORa3AQI2rQgAvONWDrFkAAOdzFeme4ER66rWJvNrhst7
3o0h2aho8OJUglh1+LmXwacjTk+cV/4ZB45VyX/M+vgxSj7QoQU3OLJyrnJeHyao
fmKg8ytCUTng2Afb2w2Us2MVW0sRcyG5SkSTTYihkSlG98qjcVxR3WRpo++8g3jF
MTgs+WCnPsgN18tT/wTTaLpRw0GlXhsqJrwAz/K+tMnsrL+r7kMmBtVFDMSJH/II
GJSgiXd7MunNXvFV9lXOKAoa/ZD4UiM9BPJ9nls6Mbr26KVG5WqEJcN4ySnIjk2n
GvSPubmvuG5fVkS5yI2RN/zQHcpu4ezwpDzxioCBaWk0c0KiVfFNCg==
=qQSE
-----END PGP SIGNATURE-----


[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux