Data destruction methods

There are three basic data destruction methods:

OVERWRITING

Nowadays, there is a great collection of commercial software that destructs data by overwriting. Although even Windows XP operating system has a tool (cipher.exe) for overwriting of free space, encryption and decryption, there is a good reason why only a few of top quality software managed to stay in the market. Namely, almost all applications available for testing will actually overwrite each sector with particular characters; however tests show that majority of such tools fail to overwrite alternative data streams or slacks. They also leave behind a large number of shadow data.

If necessary, it is best to apply DoD standard. This standard implies minimum three steps: first step is overwriting with a character, second step is overwriting with its compliment and third step is overwriting with a random character. After this procedure is completed, it is necessary to verify it.
Data Solutions Laboratory uses ATOLA equipment for data destruction procedure. As a result client receives report that guarantees permanent data destruction and, at the same time, device functionality.

Still in same cases, like device failure or large amount of defects, it is necessary to use

DEMAGNETIZATION

Another way to destroy remaining data is to create a strong magnetic field that reduces the magnetic flux to virtually zero. Demagnetization devices operate either based on changes in the magnetic field through direct current or by applying direct field of alternating current. Besides demagnetization devices, strong magnets can be used for demagnetization of a floppy or a hard disc.
Demagnetization process is slightly more complicated for tapes as it is necessary to use appropriate type of magnet for particular type of magnetic tape in order to destroy all data.
An important feature of magnetic media is that when they are exposed to extreme temperatures, or when they are stored for a long time, they become resistant to demagnetization.
Takođe noviji diskovi podnose jača magnetna polja tako da sa izvesnim izuzecima nema garancija kod ovakvog tipa uništavanja. Upravo iz tog razloga standardi propisuju fizičko uništavanje medija.

PHYSICAL DESTRUCTION

When it is of utmost importance to prevent reconstruction of most sensitive data (code books, state security service, list of agents…), physical destruction is the wisest and safest solution.

Physical destruction can be accomplished through several methods:

  • pulverization (reducing platters to ashes)
  • incineration (burning platters to ashes)
  • sanding (complete removal of platter surface by applying sand)
  • acid bath (applying acid solution or concentrated acid to platters)/li>

Physical destruction of the media that our Laboratory offers to the clients consists of turning the drive to parts and platter destruction. Unrelated interventions on the electronic components of the disk assures permanent destruction of all
possibilities to recover the data.

Comments

Morni@ Phiston Technologies

29.05.2017.

Hi there thanks for your useful post about "Data destruction methods". I agree with you that physical destruction is the wisest and safest solution. Thanks again!

Read all comments

Leave a comment

  1. Morni@ Phiston Technologies

    29.05.2017.

    Hi there thanks for your useful post about "Data destruction methods". I agree with you that physical destruction is the wisest and safest solution. Thanks again!

Leave a Reply