Data Recovery - What is possible to recover and how? Data Erasure - How to erase information in a secure way. Åke Ljungqvist, Country Manager Sweden



Similar documents
Data Recovery - What is possible to recover and how?

Solid-State Drives with Self-Encryption: Solidly Secure

ECONOMY WORKING DAYS STANDARD 3-8 WORKING DAYS

STANDARD 3-8 WORKING DAYS

Firmware security features in HP Compaq business notebooks

Figure 1: RotemNet Main Screen

FAQ for USB Flash Drive

Enterprise Erase LAN

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

OdysseyTM. removable hard disk storage system. secure. fast. expandable.

SimpleTech FlashLink (USB Flash Card Reader/Writer) User Guide

DATA SECURITY DATA RECOVERY DATA ERASING COMPUTER FORENSICS

Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive

4 Backing Up and Restoring System Software

Form #57, Revision #4 Date 7/15/2015 Data Destruction and Sanitation Program. Mobile (ON-SITE) Data Destruction/Shredding Services

Reviewers Guide. Don t Panic - Photo Edition 1

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

HIPAA Security. assistance with implementation of the. security standards. This series aims to

Cautions When Using BitLocker Drive Encryption on PRIMERGY

HP Personal Workstations Step-By- Step Instructions for Upgrading Windows Vista or Windows XP Systems to Windows 7

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

Corsair Flash Voyager USB 2.0 Flash Drive UFD Utility User s Manual

Information Technology Services Guidelines

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL.

HIPAA Security Alert

Trabajo Memorias flash

Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story

SERVER, DESKTOP AND PORTABLE SECURITY. September Version 3.0

Cyber Security: Guidelines for Backing Up Information. A Non-Technical Guide

efolder BDR for Veeam Cloud Connection Guide

VMware Horizon FLEX User Guide

HP FutureSmart Firmware Device Hard Disk Security

Local Government Cyber Security:

Stopping Leaks: How to Confront the Challenges of Endpoint Information Security from HDD. Whitepaper

Technical Proposal on ATA Secure Erase Gordon Hughes+ and Tom Coughlin* +CMRR, University of California San Diego *Coughlin Associates

Client Security Risk Assessment Questionnaire

USB FLASH DRIVE. User s Manual 1. INTRODUCTION FEATURES SPECIFICATIONS PACKAGE CONTENTS SYSTEM REQUIREMENTS...

User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection Data

Vess A2000 Series. NVR Storage Appliance. Windows Recovery Instructions. Version PROMISE Technology, Inc. All Rights Reserved.

USER S MANUAL Cloud Firewall Cloud & Web Security

ReturnStar HDD Lock V3.0 User Manual

How To Write A Health Care Security Rule For A University

Computer Storage. Computer Technology. (S1 Obj 2-3 and S3 Obj 1-1)

User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection

Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010

Industrial Flash Storage Trends in Software and Security

Keep Your Data Secure: Fighting Back With Flash

MAXIMUM PROTECTION, MINIMUM DOWNTIME

Estate Agents Authority

Other terms are defined in the Providence Privacy and Security Glossary

Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon

IT Service Desk

Interact Intranet Version 7. Technical Requirements. August Interact

Enabling bizhub HDD Security Features

Avigilon Control Center 5 System Integration Guide. for Software House C Cure 9000

Information Technology Acceptable Usage Policy

AMT Implementation on a UTC RETAIL 3170 POS

HIPAA Security COMPLIANCE Checklist For Employers

HDD Password Tool. User s Manual. English

Challenges and Solutions for Effective SSD Data Erasure

A+ Practical Applications Solution Key

DriveSavers. Premier Provider of Professional Data Recovery

EZblue BusinessServer The All - In - One Server For Your Home And Business

File Management Backing up files

VMware Horizon FLEX User Guide

ScoMIS Encryption Service

User Guide. G 4 Supreme. April AES 256 Encrypted USB Flash Drive. Prepared By: Md. Zakir Hosen

INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies

Name: Position held: Company Name: Is your organisation ISO27001 accredited:

The Evolution of a Proactive Data Management Plan Assessing, Protecting, and Recovering Sensitive Information (PII/PHI)

POLICIES. Campus Data Security Policy. Issued: September, 2009 Responsible Official: Director of IT Responsible Office: IT Central.

CITY UNIVERSITY OF HONG KONG. Information Classification and

FORBIDDEN - Ethical Hacking Workshop Duration

USB FLASH DRIVE. User s Manual. USB 2.0 Compliant. Version A Version A10

Data Access Request Service

Hi-Speed USB 2.0 Media Reader & Writer with 3-Port Hub

Online Backup by Mozy. Common Questions

TABLE OF CONTENTS. Quick Start - Windows File System idataagent. Page 1 of 44 OVERVIEW SYSTEM REQUIREMENTS DEPLOYMENT

4cast Server Specification and Installation

IT Networking and Security

Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken

Obtaining a Memory Dump on Windows Servers

Pointsec Enterprise Encryption and Access Control for Laptops and Workstations

TECHNICAL SECURITY AND DATA BACKUP POLICY

Information Security Policy. Policy and Procedures

Security for Mac Computers in the Enterprise

Computer Backup Strategies

Backup & Disaster Recovery Appliance User Guide

IT - General Controls Questionnaire

State of South Carolina Policy Guidance and Training

nabi OS Installation Guide For Windows

Intel Compute Stick STCK1A32WFC User Guide. Intel Compute Stick STCK1A32WFC

Data Security 2. Implement Network Controls

Privacy Data Loss. Privacy Data Loss. Identity Theft. The Legal Issues

What the student will need:

HIPAA Information Security Overview

2 Getting started User interface language Protecting your system...15

Crash Proof - Data Loss Prevention

A practical guide to IT security

Transcription:

Data Recovery - What is possible to recover and how? Data Erasure - How to erase information in a secure way Åke Ljungqvist, Country Manager Sweden

Who is Ibas? Norway... Recovery of hard drives after fire exposure... Unforeseen costs...

About Ibas Founded in 1978 Owner: Kroll Ontrack Business areas - Data Recovery - Data Erasure - Computer Forensics Number of employed (Nordic countries): 68 World wide (Kroll Ontrack) Global customer service: 24/7/365

Data Recovery

Data recovery when your backup fails... Large amounts of data are stored on hard drives Technology is stressed to its limit in order to squeeze in more data 640 000 A4 binders equals 640 GB of data

Data recovery when your backup fails... Large amounts of data are stored on hard drives Technology is stressed to its limit in order to squeeze in more data Hard drives will crash Backup systems fails or are missing Human errors occurs!

Only 50% of the companies in Sweden have procedures for backup of laptops!!

PC users are the biggest threat to security!!

-98% of the IT managers said that all important data is stored on their servers where the backup is running - 20% of the users said they store data locally on their own hard drive

Data recovery- in practice

Data recovery - step by step Analysis Report Order Recovery Delivery Economy 4-6 days Standard 2 days Express 7 hours Type of Problem Amount of data Delivery time Cost Order from customer Economy 6-10 days Standard 3-5 days Express 24 hours TNT JetPak Post Taxi Via Internet All data handling and management is confidential, done by emplyoees with a SÄPO (Swedish Security Service) security clearance

Physical damage Head crash (1) (2) (3) What is that click sound? (OK disk) (Head crash) Shock damage often happens to laptops Electronic failure Mechanical damage Water (4)(5) Fire/Heat (6)

Logical damage Viruses Removed files Partial overwrite Lost/corrupt system information Loss of specific data due to physical damage

Typical damage - Tape Physical damage Entanglement Breaches Mechanical failures on tape recorders Logical damage Overwriting with a new backup Logical damage in header and raw data

Recovery of flash memories Pictures/music/data etc from all types of flash memories on the market can be recovered, e.g.: CompactFlash Secure Digital Memory Stick SmartMedia xd Picture Card mini / micro SD

Photo by Helena Larsson, Naturfotograferna

Photo by Helena Larsson, Naturfotograferna

Photo by Helena Larsson, Naturfotograferna

First advice to the user Don t panic! Disconnect the power Don t attempt a re-start Don t re-install the Operating System or application S/W Don t open the hard drive Make a thorough assessment of the situation

Data Erasure

Data Erasure Protecting information in use is natural Firewalls Encryption Passwords Remote login security But what happens to the information when we throw away our computers.? A TV news flash

Why data erasure? SECURITY correct methodology prevents information leakage ECONOMY re-use is economic - - premature disposal is costly ENVIRONMENT - functioning hard disks make re-use possible PUL Legal requirements

Why data erasure? SECURITY correct methodology prevents information leakage ECONOMY re-use is economic - - premature disposal is costly ENVIRONMENT - functioning hard disks make re-use possible PUL Legal requirements

160 000 000 SEK down the drain When the computers could be reused

The Swedish Data Inspection Board:

Data erasure How? FUNCTIONING hard drive OS-tools (Formatting/deletion) Not intended for complete erasure Dependent on the Operating System Tools for file removal Overwrites part of the hard drive Dependent on the Operating System Disk sanitizers Overwrites the whole hard drive Independent of the Operating System Independent of the BIOS

What do we want to achieve? All magnetic storage is based on a single principle, i.e.: Data is stored by changing the polarity of magnetic domains

System overview: USER OS Tool APPLICATION OS Sanitizing Tools HOST SYSTEM Buffer Memory BIOS OntrackEraser HARD DRIVE Sector Buffer uc+firmware Media

Erasure report - Traceability Ontrack Eraser Report ------------------------------------------------------------ Time of erasure Fri Sep 07 16:27:30 2007 Time of report upload Fri Sep 07 16:00:26 2007 Software Version 3.0.1.2 Overwrites 1 Verify False Pattern SEKollOntrack Algorithm Report Security Hash eba2f7cead6157a219ceaf13cf410403 Customer Defined Fields: Media ------------ Disk #1 Model ST3160828AS40Y9046LEN Serial Number 4MT26SCK Capacity 160041885696 Block Size 512 Type Erasure Status Success Unlock Success Lock type No locking ---------------- Model IBM Manufacturer IBM Version 0 Serial 65453168416871 BIOS: Vendor IBM Version 2EKT32AUS (12/16/2005) RAM: Slot J10 Size 0 Slot J3 Size 536870912 Slot J4 Size 0 Slot J9 Size 536870912 Slot System board or motherboard Size 1073741824 CPU: Slot LGA775/PSC/TJS Product Intel(R) Pentium(R) 4 CPU 3.40GHz Vendor Intel Corp. Capacity 3800000000 Width 64 Size 3400000000

Data erasure How? Defect hard drives and other media Saturation of the magnetic layer Fast and secure method when data must not be re-used Erasure of hard drives, tape and floppy disks Compliant to the Department of Defence standard (DoD 5220.22M) and Swedish military requirements

What does the data look like? A data track on a hard drive before degaussing

What does the data look like? A data track on a hard disk after degaussing

Thank you for listening! Åke Ljungqvist 070-397 10 55 ake@ibas.se