Loading…

Disposal of Disk and Tape Data by Secure Sanitization

User data is often unprotected on disk and tape drives or not erased when no longer needed, creating data security vulnerabilities that many computer users are unaware of. Federal and state laws require data sanitization, which comprises a variety of data eradication methods. Secure sanitization ref...

Full description

Saved in:
Bibliographic Details
Published in:IEEE security & privacy 2009-07, Vol.7 (4), p.29-34
Main Authors: Hughes, Gordon F., Coughlin, Tom, Commins, Daniel M.
Format: Magazinearticle
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c313t-b090adf9b4c433f34e8c9ca86345d7e437755d75c1d3989896bbed2c17fdcdb73
cites cdi_FETCH-LOGICAL-c313t-b090adf9b4c433f34e8c9ca86345d7e437755d75c1d3989896bbed2c17fdcdb73
container_end_page 34
container_issue 4
container_start_page 29
container_title IEEE security & privacy
container_volume 7
creator Hughes, Gordon F.
Coughlin, Tom
Commins, Daniel M.
description User data is often unprotected on disk and tape drives or not erased when no longer needed, creating data security vulnerabilities that many computer users are unaware of. Federal and state laws require data sanitization, which comprises a variety of data eradication methods. Secure sanitization refers to methods meeting those federal and state laws. Companies that fail to meet these laws can be subject to fines of 5 million, and individuals can be imprisoned for up to 10 years. Physical destruction of storage devices offers the highest security. But executing the disk drive internal secure-erase command also offers a higher security level than external-block-overwrite software, according to federal guideline NIST 800-88. Recent disk drives with internal full disk encryption now implement an enhanced secure-erase command that takes only milliseconds to complete.
doi_str_mv 10.1109/MSP.2009.89
format magazinearticle
fullrecord <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_ieee_primary_5189559</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5189559</ieee_id><sourcerecordid>1671395952</sourcerecordid><originalsourceid>FETCH-LOGICAL-c313t-b090adf9b4c433f34e8c9ca86345d7e437755d75c1d3989896bbed2c17fdcdb73</originalsourceid><addsrcrecordid>eNpd0M9LwzAUB_AgCs7pyaOX4EmQzqRJmryjbP6CicLmOaRpCp1dU5P2MP96MyYe5B3e9_Dh8fgidEnJjFICd6-r91lOCMwUHKEJFUJlnPDieJ85ySQAO0VnMW4IySkVaoLEoom9j6bFvsYpf2LTVXhteocXZjC43OGVs2NweGW6Zmi-zdD47hyd1KaN7uJ3T9HH48N6_pwt355e5vfLzDLKhqwkQExVQ8ktZ6xm3CkL1qiCcVFJx5mUIgVhacVApSnK0lW5pbKubFVKNkU3h7t98F-ji4PeNtG6tjWd82PUtJCUgQCRJ3r9j278GLr0nQaas4JzxhO6PSAbfIzB1boPzdaEnaZE7xvUqUG9b1ArSPrqoBvn3J8UVIEQwH4AtZFqHA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>magazinearticle</recordtype><pqid>912364434</pqid></control><display><type>magazinearticle</type><title>Disposal of Disk and Tape Data by Secure Sanitization</title><source>IEEE Xplore (Online service)</source><creator>Hughes, Gordon F. ; Coughlin, Tom ; Commins, Daniel M.</creator><creatorcontrib>Hughes, Gordon F. ; Coughlin, Tom ; Commins, Daniel M.</creatorcontrib><description>User data is often unprotected on disk and tape drives or not erased when no longer needed, creating data security vulnerabilities that many computer users are unaware of. Federal and state laws require data sanitization, which comprises a variety of data eradication methods. Secure sanitization refers to methods meeting those federal and state laws. Companies that fail to meet these laws can be subject to fines of 5 million, and individuals can be imprisoned for up to 10 years. Physical destruction of storage devices offers the highest security. But executing the disk drive internal secure-erase command also offers a higher security level than external-block-overwrite software, according to federal guideline NIST 800-88. Recent disk drives with internal full disk encryption now implement an enhanced secure-erase command that takes only milliseconds to complete.</description><identifier>ISSN: 1540-7993</identifier><identifier>EISSN: 1558-4046</identifier><identifier>DOI: 10.1109/MSP.2009.89</identifier><identifier>CODEN: ISPMCN</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>ANSI ; Commands ; Computer information security ; Computer programs ; Cryptography ; data encryption ; Data privacy ; data sanitization ; Data security ; degaussing ; Disk drives ; Disk recording ; Disks ; Drives ; enhanced secure erase ; File systems ; FIPS 140 ; Guidelines ; information resource management ; Laws ; legal ; Linux ; mass storage ; NIST ; NIST 800-88 ; Open source software ; secure erase ; security and privacy protection ; Software ; storage management ; Trusted Computing Group ; World Wide Web</subject><ispartof>IEEE security &amp; privacy, 2009-07, Vol.7 (4), p.29-34</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2009</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c313t-b090adf9b4c433f34e8c9ca86345d7e437755d75c1d3989896bbed2c17fdcdb73</citedby><cites>FETCH-LOGICAL-c313t-b090adf9b4c433f34e8c9ca86345d7e437755d75c1d3989896bbed2c17fdcdb73</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5189559$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>780,784,27925,54796</link.rule.ids></links><search><creatorcontrib>Hughes, Gordon F.</creatorcontrib><creatorcontrib>Coughlin, Tom</creatorcontrib><creatorcontrib>Commins, Daniel M.</creatorcontrib><title>Disposal of Disk and Tape Data by Secure Sanitization</title><title>IEEE security &amp; privacy</title><addtitle>SECP-M</addtitle><description>User data is often unprotected on disk and tape drives or not erased when no longer needed, creating data security vulnerabilities that many computer users are unaware of. Federal and state laws require data sanitization, which comprises a variety of data eradication methods. Secure sanitization refers to methods meeting those federal and state laws. Companies that fail to meet these laws can be subject to fines of 5 million, and individuals can be imprisoned for up to 10 years. Physical destruction of storage devices offers the highest security. But executing the disk drive internal secure-erase command also offers a higher security level than external-block-overwrite software, according to federal guideline NIST 800-88. Recent disk drives with internal full disk encryption now implement an enhanced secure-erase command that takes only milliseconds to complete.</description><subject>ANSI</subject><subject>Commands</subject><subject>Computer information security</subject><subject>Computer programs</subject><subject>Cryptography</subject><subject>data encryption</subject><subject>Data privacy</subject><subject>data sanitization</subject><subject>Data security</subject><subject>degaussing</subject><subject>Disk drives</subject><subject>Disk recording</subject><subject>Disks</subject><subject>Drives</subject><subject>enhanced secure erase</subject><subject>File systems</subject><subject>FIPS 140</subject><subject>Guidelines</subject><subject>information resource management</subject><subject>Laws</subject><subject>legal</subject><subject>Linux</subject><subject>mass storage</subject><subject>NIST</subject><subject>NIST 800-88</subject><subject>Open source software</subject><subject>secure erase</subject><subject>security and privacy protection</subject><subject>Software</subject><subject>storage management</subject><subject>Trusted Computing Group</subject><subject>World Wide Web</subject><issn>1540-7993</issn><issn>1558-4046</issn><fulltext>true</fulltext><rsrctype>magazinearticle</rsrctype><creationdate>2009</creationdate><recordtype>magazinearticle</recordtype><recordid>eNpd0M9LwzAUB_AgCs7pyaOX4EmQzqRJmryjbP6CicLmOaRpCp1dU5P2MP96MyYe5B3e9_Dh8fgidEnJjFICd6-r91lOCMwUHKEJFUJlnPDieJ85ySQAO0VnMW4IySkVaoLEoom9j6bFvsYpf2LTVXhteocXZjC43OGVs2NweGW6Zmi-zdD47hyd1KaN7uJ3T9HH48N6_pwt355e5vfLzDLKhqwkQExVQ8ktZ6xm3CkL1qiCcVFJx5mUIgVhacVApSnK0lW5pbKubFVKNkU3h7t98F-ji4PeNtG6tjWd82PUtJCUgQCRJ3r9j278GLr0nQaas4JzxhO6PSAbfIzB1boPzdaEnaZE7xvUqUG9b1ArSPrqoBvn3J8UVIEQwH4AtZFqHA</recordid><startdate>20090701</startdate><enddate>20090701</enddate><creator>Hughes, Gordon F.</creator><creator>Coughlin, Tom</creator><creator>Commins, Daniel M.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>7SP</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>20090701</creationdate><title>Disposal of Disk and Tape Data by Secure Sanitization</title><author>Hughes, Gordon F. ; Coughlin, Tom ; Commins, Daniel M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c313t-b090adf9b4c433f34e8c9ca86345d7e437755d75c1d3989896bbed2c17fdcdb73</frbrgroupid><rsrctype>magazinearticle</rsrctype><prefilter>magazinearticle</prefilter><language>eng</language><creationdate>2009</creationdate><topic>ANSI</topic><topic>Commands</topic><topic>Computer information security</topic><topic>Computer programs</topic><topic>Cryptography</topic><topic>data encryption</topic><topic>Data privacy</topic><topic>data sanitization</topic><topic>Data security</topic><topic>degaussing</topic><topic>Disk drives</topic><topic>Disk recording</topic><topic>Disks</topic><topic>Drives</topic><topic>enhanced secure erase</topic><topic>File systems</topic><topic>FIPS 140</topic><topic>Guidelines</topic><topic>information resource management</topic><topic>Laws</topic><topic>legal</topic><topic>Linux</topic><topic>mass storage</topic><topic>NIST</topic><topic>NIST 800-88</topic><topic>Open source software</topic><topic>secure erase</topic><topic>security and privacy protection</topic><topic>Software</topic><topic>storage management</topic><topic>Trusted Computing Group</topic><topic>World Wide Web</topic><toplevel>online_resources</toplevel><creatorcontrib>Hughes, Gordon F.</creatorcontrib><creatorcontrib>Coughlin, Tom</creatorcontrib><creatorcontrib>Commins, Daniel M.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Xplore (Online service)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE security &amp; privacy</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Hughes, Gordon F.</au><au>Coughlin, Tom</au><au>Commins, Daniel M.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Disposal of Disk and Tape Data by Secure Sanitization</atitle><jtitle>IEEE security &amp; privacy</jtitle><stitle>SECP-M</stitle><date>2009-07-01</date><risdate>2009</risdate><volume>7</volume><issue>4</issue><spage>29</spage><epage>34</epage><pages>29-34</pages><issn>1540-7993</issn><eissn>1558-4046</eissn><coden>ISPMCN</coden><abstract>User data is often unprotected on disk and tape drives or not erased when no longer needed, creating data security vulnerabilities that many computer users are unaware of. Federal and state laws require data sanitization, which comprises a variety of data eradication methods. Secure sanitization refers to methods meeting those federal and state laws. Companies that fail to meet these laws can be subject to fines of 5 million, and individuals can be imprisoned for up to 10 years. Physical destruction of storage devices offers the highest security. But executing the disk drive internal secure-erase command also offers a higher security level than external-block-overwrite software, according to federal guideline NIST 800-88. Recent disk drives with internal full disk encryption now implement an enhanced secure-erase command that takes only milliseconds to complete.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/MSP.2009.89</doi><tpages>6</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1540-7993
ispartof IEEE security & privacy, 2009-07, Vol.7 (4), p.29-34
issn 1540-7993
1558-4046
language eng
recordid cdi_ieee_primary_5189559
source IEEE Xplore (Online service)
subjects ANSI
Commands
Computer information security
Computer programs
Cryptography
data encryption
Data privacy
data sanitization
Data security
degaussing
Disk drives
Disk recording
Disks
Drives
enhanced secure erase
File systems
FIPS 140
Guidelines
information resource management
Laws
legal
Linux
mass storage
NIST
NIST 800-88
Open source software
secure erase
security and privacy protection
Software
storage management
Trusted Computing Group
World Wide Web
title Disposal of Disk and Tape Data by Secure Sanitization
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T15%3A48%3A33IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Disposal%20of%20Disk%20and%20Tape%20Data%20by%20Secure%20Sanitization&rft.jtitle=IEEE%20security%20&%20privacy&rft.au=Hughes,%20Gordon%20F.&rft.date=2009-07-01&rft.volume=7&rft.issue=4&rft.spage=29&rft.epage=34&rft.pages=29-34&rft.issn=1540-7993&rft.eissn=1558-4046&rft.coden=ISPMCN&rft_id=info:doi/10.1109/MSP.2009.89&rft_dat=%3Cproquest_ieee_%3E1671395952%3C/proquest_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c313t-b090adf9b4c433f34e8c9ca86345d7e437755d75c1d3989896bbed2c17fdcdb73%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=912364434&rft_id=info:pmid/&rft_ieee_id=5189559&rfr_iscdi=true