الدكتور عادل إسماعيل العلوي الجامعة الملكية للبنات البحرين نائب رئيس الجمعية الدولية لضبط ومراقبة نظم المعلومات



Similar documents
Media Disposition and Sanitation Procedure

That s why outsourcing using a Qualified Contractor is the best solution to the problem of assuring a compliant hard drive destruction audit trail.

Destruction and Disposal of Sensitive Data

Building an ITAD Program:

Best Practices for Responsible Disposal of Tape Media

Space Shuttle Columbia Hard Drive: How NASA Data was Recovered After Crash

CENTRALLY MANAGED PROCESS MINIMIZING RISK MAXIMIZING REMARKETING VALUE

Office Equipment Disposal Policy

The nation s largest privately held records and information management company

Technical Reference Document Summary of NIST Special Publication : Guidelines for Media Sanitization

Samsung WEEE Management Policy (US and Canada)

NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE NSA/CSS POLICY MANUAL Issue Date: 15 December 2014 Revised:

Information Technology Services Guidelines

CCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd

The guidance applies to all records, regardless of the medium in which they are held, including , spreadsheets, databases and paper files.

State of Vermont. Digital Media and Hardware Disposal Standard. Date: Approved by: Policy Number:

A Guide to Minimizing the Risk of IT Asset Disposition

HIPAA Training for Hospice Staff and Volunteers

Hard drives dumped; information isn't DON'T BE SMUG IN THINKING PERSONAL DATA HAS BEEN ERASED By Larry Magid Special to the Mercury News

DATA SECURITY DATA RECOVERY DATA ERASING COMPUTER FORENSICS

Get rid of it Securely to keep it Private

Secure Mobile Shredding and. Solutions

Computer Storage. Computer Technology. (S1 Obj 2-3 and S3 Obj 1-1)

Technical Proposal on ATA Secure Erase Gordon Hughes+ and Tom Coughlin* +CMRR, University of California San Diego *Coughlin Associates


8/28/2015. How to Manage Records. Overview. Learning Objectives. Do you have? Does your office look like this?

Managing Records: Retention, Destruction and Disposal

Local Government Cyber Security:

University of Wisconsin-Madison Policy and Procedure

Cyber Security: Guidelines for Backing Up Information. A Non-Technical Guide

Challenges and Solutions for Effective SSD Data Erasure

Business details. Monday Friday. 10:00am 6:00pm. Saturday 10:00am 5:00pm. Telephone:

Protecting. Personal Information A Business Guide. Division of Finance and Corporate Securities

Course: Information Security Management in e-governance

UNCLASSIFIED. This page intentionally left blank. UNCLASSIFIED. Clearing And Declassifying Electronic Data Storage Devices (ITSG-06) ii July 2006

Solid-State Drives with Self-Encryption: Solidly Secure

Guidance on Personal Data Erasure and Anonymisation 1

IT Trading UK Ltd Computer & IT Equipment Disposal Specialists

Here are my slides from lecture, along with my notes about each slide.

Recycling Old Mobile Phones

How to implement a Recycling Policy and begin the journey towards Zero Waste

ECONOMY WORKING DAYS STANDARD 3-8 WORKING DAYS

Student Guide.

Backup and Recovery Plan For Small Businesses

Document Management Plan Preparation Guidelines

The Health and Environmental Impacts of e-waste

Securing Data on Portable Media.

Protecting MIT Data. State Laws & Regulations. T. McGovern, M. Yeaton, M. Halsall, S. Burke, B. DiMattia

Auslogics BoostSpeed 5 Manual

HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

PGP Desktop Quick Start Guide version 9.6

HIPAA Security. assistance with implementation of the. security standards. This series aims to

Hands-On How-To Computer Forensics Training

Storing and securing your data

IWR Integrated Waste Recycling. Integrated System for treatment and recycling of Municipal Solid Waste

INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies

Asset Management Ireland (AMI) The secure IT Asset Disposal Company that generates revenue for your business

Guide to good practice: micro data handling and security

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

Disaster Recovery Planning Save Your Business

Secure Storage, Communication & Transportation of Personal Information Policy Disclaimer:

STANDARD 3-8 WORKING DAYS

Data storage, collaboration, backup, transfer and encryption

Shredding. Security. Recycling

Information Technology Acceptable Usage Policy

Tutorial on Disk Drive Data Sanitization. Summary. Introduction. Table of Contents

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL.

Transcription:

- البحرين الدكتور عادل إسماعيل العلوي الجامعة الملكية للبنات البحرين نائب رئيس الجمعية الدولية لضبط ومراقبة نظم المعلومات

Agenda The problem Traditional Methods Case Study Recommendation

The problem

What is E-waste??? Electronic waste or e-waste is the rapidly expanding volume of obsolete computers, printers, fax machines, mobiles, TVs, photo copies other electronic devices Guaranteed Recycling Xperts Slide 4

How Much E-waste Is There? e-waste is a recent phenomenon 130 million cell phones discarded in the US in 2005 60-65 million PCs become obsolete every year in the US Environmental Production Association estimate 1.9 million tons of e-waste landfilled in 2000 (EXCLUDING electric appliances) 3 5% of material in landfills growing 3 times the rate of other waste 315 680 million computers/tvs waiting in e-waste purgatory Guaranteed Recycling Xperts Slide 5

Where your Data is Stored? Hard Drives & Disks (ATA, USB, Zip disks, SCSI Drives, Magnetic Tapes, Floppies) CDs & DVDs cell phones, Blackberrys and other PDA Routers Copy Machines & Fax Machines

Private Data final destination Ref. Richard Troia i-recycle

Personal Record Personal Info Payment Info (e.g. Credit Card, Bank Account..etc.) Passwords Personal Correspondences Mission critical information Intellectual property Licensed software Personal Preferences/Behavior Other Personal Info (Pictures, family details, relations, medial info..etc.)

Business Records Today, 90 to 95% of all business records are stored in e-format & Paper represents <10% of all Business Records A single gigabyte of electronic storage has the capacity to store up to 75,000 typewritten sheets of papers. After 2 to 3 years of computer or BlackBerry use, it is easy to lose track of what information is stored and where it is located.

Theft of Sensitive Information 2003 MIT Student Study: 158 used hard drives 129 still worked 69 had recoverable files 49 contained credit card, medical records & personal correspondence 1 contained ATM transaction info. One of the top areas for dumping e-waste is Africa The number one area of the world for identity theft is AFRICA! Slide 10

Traditional Methods

The Benefits of Recycling the HD HDD is commonly known as Hard Disk Drive The primary device for storing all your data. One of the most expensive components in a computer (made up mostly of aluminum and other non-biodegradable materials). Provide us with highly reusable materials & protect the environment. Saving a portion of the cost associated with the laborious process by which the whole unit is assembled including the treatment of platters in order to attain a mirror finish.

HD recycling Barrier What happens when your info fall in the wrong hand Utilize this info (Marketing, Competitors) Identity Theft Crimes (e.g. blackmail, financial transaction)

Is it easy to destroy files Ways to Try to Erase Hard Drive Data Is the Data Truly Gone? Simply Delete the File Empty the Recycle Bin Format the Hard Drive Repartition the Hard Drive Installing a new operating system You need more than this!!!

Physical destruction Smash it with a hammer and use a hacksaw (Disintegrate & Pulverize). Grind it to dust (Incinerate). Burn it with acid. Shred Effective, if done correctly (100% destruction in 30 seconds) Makes drive inoperable Time consuming, Flying debris Can t be recycled (Not environmentally friendly) Shredders are costly and not widely available

Software Destruction Meaningless pattern of 0 s and 1 s convenient, and permanent Maybe inaccurate Can t be used if media is damaged Need another hard drive to run the software Consume Cost, time and resources (days or weeks for few hundreds HD)

Degaussing Strong electromagnetic field destroys data Machine expensive Not guaranteed to penetrate shield Hard drive cannot be reused

Still Recovery is possible Data Recovery Software EnCase Forensic ToolKit E-Mail Examiner Many other specific use tools Data Recovery Hardware Adapters Write-blockers

Case Study

Glamorgan University Study A recent study by Glamorgan University (source: Time Online website) revealed more that 50% of 111 hard drives purchased contained personal and confidential information. Over 87% of those drives were bought from ebay. This may raises an international concern. While this is beneficial for the legitimated user, there is risk handling over our personal data to terrorists, and corrupt organizations, not to mention the risk of being blackmailed or threatened

Space Shuttle Columbia Hard Drive: How NASA Data was recovered after Crash

Timeline of Events February 1, 2003 Space shuttle Columbia disaster September 26, 2003 Ontrack Data recovery receives 3 drives recovered from debris September 29, 2003 Ontrack completes recovery of one of the disks April 17, 2008 Physical Review E publishes results of the experiment

Hard Drive Condition Looked like a cracked hunk of metal when it arrived for recovery. Every piece of plastic melted All chips burned and loose. Dirty and charred elements in the casing Everything but the platters were unusable.

Engineers worked to cut away protective top cover to get access to hard disk assembly http://www.computerworld.com/action/article.do?command=viewarticlebasic&articleid=9083478

Engineers then opened the top cover of the hard disk http://www.computerworld.com/action/article.do?command=viewarticlebasic&articleid=9083478

Engineers had to remove melted plastic from media and corroded, melted head assembly to remove each hard drive platter http://www.computerworld.com/action/article.do?command=viewarticlebasic&articleid=9083478

Recovery Details Platters were intact, but dirty. Cleaned the platters with special chemicals. Placed in a new enclosure Replaced the damage with minor adjustment Used custom software for data transfer that includes sophisticated error handling and calculations. Recovered 99% of the data on the drive.

Solution

ATA principles of proper data destruction A Absolute: With permission to destroy a record, destroy it in a way that it can never possibly be recovered under any conditions, including forensic data recovery techniques. T Timely: Accumulation of data storage devices is a dangerous practice and should be minimized and all destruction events should take place on a scheduled basis avoiding ad hoc destruction activity that can lead to legal challenges as to the timing of the destruction event. A- Auditability: Must be able to prove that destruction activity is routine and done in good faith.

Monitoring & Control of Recycling firms Provide assurance Assurance Independent Audit Firms Expert Confidence Obtain confidence Proof experience Transparency Solid & Transparent work environment make someone responsible Accountability Measurability clearly defined policy

Consequences of Non-compliance Loss of Public Trust Loss of Business Legal Fines Cost of Mitigation

Market Practice Individual Promises (DELL, HP, IBM, Nokia and others) Independent Authorities (e.g. NIST - National Institute of Standards and Technology) Other legislation such as Health Insurance Portability and Accountability Act. Sarbanes-Oxley Act. Gramm-Leach-Bliley Act. (financial industry). Family Educational Rights and Privacy Act (for educational institutions). Fair and Accurate Credit Transactions Act.

Certifying Bodies e-stewards Initiative (e-stewards.org) The e-stewards Initiative is a project of the Basel Action Network (BAN), which is a 501(c)3 non-profit, charitable organization of the United States, based in Seattle, Washington. It is against the backdrop of the growing e-waste crisis that the e-stewards Initiative was born. Without appropriate national and international legislation or enforcement in place in many regions, it is unfortunately left up to individual citizens, corporations, universities, cities all of us to figure out how to prevent the toxic materials in electronics from continuing to cause long term harm to human health and the environment, particularly in countries with developing economies. The National Association For Information Destruction (NAID) offers a highly respected secure data destruction certification program, which helps companies to find qualified providers of secure data destruction. NAID's mission is to promote the information destruction industry and the standards and ethics of its member companies. NAID AAA Certification For Secure Data Destruction

Sanitization Methods Clear use software or hardware products to overwrite storage space on the media with non-sensitive data. Purge Degaussing is exposing the magnetic media to a strong magnetic field in order to disrupt the recorded magnetic domains. Destroy Disintegration, Pulverization, Melting, and Incineration Shredding.

NIST GUIDELINES FOR MEDIA SANITIZATION

Other Guidelines

Middle East Status No Certifying Body

Many Thanks adel.alalawi@gmail.com www.isacabahrain.gov