Font Size: a A A

Secure Erase Hard Drive Data In The Study Of Residual

Posted on:2013-01-30Degree:MasterType:Thesis
Country:ChinaCandidate:Y X DuFull Text:PDF
GTID:2218330371455115Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the widely use of computer system and the rapid development of information technology, information security is becoming more and more for system designers and users attach. Especially in recent years, data recovery technology with the rapid development of the operating system of the data removal techniques become more reliable, which leads to the hard disk contains sensitive information is likely to be the attacker through modern computer easy access to information, resulting in inadvertent leak. The data processing and removal of residues has become related to the country and the interests of national economy, enhance the informatization level and national security issues.This paper investigated the theory and method of sanitizing data remanence securely in computer storage media, it included the theories of computer sanitization and recovery, the security problems of sanitization technique, overwriting, the IDE interface of hard disk. the Logic Block Address(LBA) mode, the technique of reading or writing hard disk by ProgramIn Out (PIO) mode under offline and online and so on. Firstly, this paper investigated the reasons of data remanence and analyzed the insecurity of the computer sanitization technique. And it introduced the secure sanitization technique and data destroying technique:physical destroying, degaussing and emergency destroying. Combining the trusted computer system evaluation criteria, it put forward the idea of three levels sanitization. The idea was based on adopting different sanitization operation for different security levels of data. Secondly, this paper not only investigated the basic principle of overwriting and Run Length Limit (RLL) code, but also designed and developed the software of sanitizing data securely. Combining the contrasted experiment of sanitization and recovery, it tested the reliability of the traditional sanitization and the secure sanitization. Finally, this paper investigated the technique of reading or writing hard disk thoroughly, and on which designed the scheme of implementing the protable equipment of secure sanitization. This investigation had academic and applied value for improving computer system security and reducing the security problems because of dealing with sensitive information improperly.
Keywords/Search Tags:Data remanence, Secure sanitization, Overwrite, PIO mode, SCM
PDF Full Text Request
Related items