1 X-Ways Security: Permanent Erasure Supervised By: Dr. Lo’ai Tawalbeh Prepared By :Murad M. Ali.

Slides:



Advertisements
Similar presentations
Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
Advertisements

Operating Systems File Management.
Computing Fundamentals Module Lesson 5 — File Management with Windows Explorer Computer Literacy BASICS.
Text Searches Slack Space Unallocated Space
This presentation will take a look at to prevent your information from being discovered by and investigator.
Backup Strategy. An Exam question will ask you to describe a backup strategy. Be able to explain: Safe, secure place in different location. Why? – For.
MODULE 4 File and Folder Management. Creating file and folder A computer file is a resource for storing information, which is available to a computer.
Lesson 3: File Management. 2 Learning Objectives After studying this lesson, you will be able to:  Browse files on the computer  Open files from a folder.
File System Analysis.
File Management Systems
X-Ways Trace Prepared By: Leen F. Arikat Supervisor: Dr. Lo’ai Tawalbeh.
Operating Systems and File Management
Lecture 10: The FAT, VFAT, and NTFS Filesystems 6/17/2003 CSCE 590 Summer 2003.
CS 333 Introduction to Operating Systems Class 18 - File System Performance Jonathan Walpole Computer Science Portland State University.
Chapter 12 File Management Systems
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
Data Elimination 101. What Does Degauss Mean? Computer hard drives use magnetic fields to store data on special discs called platters. Degaussing is the.
Backup and Recovery Part 1.
1 Using Compressed Files and Folders Applications and operating systems read and write to compressed files. NTFS uncompresses the file before making it.
Chapter 4 Operating Systems and File Management. 4 Chapter 4: Operating Systems and File Management 2 Chapter Contents  Section A: Operating System Basics.
A Feature-Based of IT Automation using kaseya’s agent procedure called the wiping of unallocated disk space using cipher.exe Developed By: Estuardo Fernandez.
Basic Computer Maintenance Basic Computer Maintenance Clean and Cool Deleting Temporary Files Scandisk Backup Your Data How to.
1 Chapter Overview Managing Data Storage Creating Dynamic Disks Implementing Storage Quotas Managing Compression and Encryption.
Chapter 4: Operating Systems and File Management 1 Operating Systems and File Management Chapter 4.
Data Deletion and Recovery. Data Deletion  What does data deletion mean in your own words?
Transactions and Reliability. File system components Disk management Naming Reliability  What are the reliability issues in file systems? Security.
Computing Fundamentals Module Lesson 5 — File Management with Windows Explorer Computer Literacy BASICS.
Operating Systems and File Management Chapter 4. 4 Chapter 4: Operating Systems and File Management2 Chapter Contents  Section A: Operating System Basics.
Objectives Learn what a file system does
1 Chapter 12 File Management Systems. 2 Systems Architecture Chapter 12.
Software.
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
Component 4: Introduction to Information and Computer Science Unit 4: Application and System Software Lecture 3 This material was developed by Oregon Health.
Bits, Bytes, Files, Hard Drives. Bits, Bytes, Letters and Words ● Bit – single piece of information ● Either a 0 or a 1 ● Byte – 8 bits of information.
C HAPTER 7 Managing Disk and File System. I NTRODUCING DISK MANAGEMENT 2 types of hard disk storage supported by Windows XP are: basic hard disk & dynamic.
Microsoft Office 2008 for Mac – Illustrated Unit C: Understanding File Management.
1 Interface Two most common types of interfaces –SCSI: Small Computer Systems Interface (servers and high-performance desktops) –IDE/ATA: Integrated Drive.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
Founded in 1981, Executive Software is the industry leader in system performance software for Windows NT/2000/XP and DEC VMS systems. Developed Diskeeper,
Computing Fundamentals Module Lesson 10 — File Management with Windows Explorer Computer Literacy BASICS.
XP New Perspectives on Windows 2000 Professional Windows 2000 Tutorial 2 1 Microsoft Windows 2000 Professional Tutorial 2 – Working With Files.
Lesson 12: Using the Recycle Bin deleting files or folders what the Recycle Bin is restoring files from the Recycle Bin emptying the Recycle Bin identifying.
Database structure and space Management. Database Structure An ORACLE database has both a physical and logical structure. By separating physical and logical.
MCSE Guide to Microsoft Windows Vista Professional Chapter 5 Managing File Systems.
Computer Data Expert The following slides are from a presentation developed to support/explain a Data Forensics expert testimony. Click or hit spacebar.
Cosc 4750 Backups Why Backup? In case of failure In case of loss of files –User and system files Because you will regret it, if you don’t. –DUMB = Disasters.
Lesson 20: Managing Local Storage MOAC : Configuring Windows 8.1.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
| nectar.org.au NECTAR TRAINING Module 9 Backing up & Packing up.
Computer Literacy BASICS: A Comprehensive Guide to IC 3, 5 th Edition Lesson 3 Windows File Management 1 Morrison / Wells / Ruffolo.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 File Systems September 22, 2008.
Chapter 8 File Systems FAT 12/16/32. Defragmentation Defrag a hard drive – Control Panel  System and Security  Administration tools  Defrag hard drive.
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Instant File Recovery and Data Protection for Windows ® Networks.
How to Create and Use a VericrYPT CONTAINER
Avast has always come up with the new features to stand amongst its competitors. Data Shredder is a feature which allows the user to remove or erase the.
File-System Management
Microsoft Windows 7 - Illustrated
Computer Literacy BASICS
Understanding File Management
Introduction To Computers
Introduction to Computers
Introduction to Computers
File Management.
Microsoft Windows 2000 Professional
Normal deletion Shift deletion
COMP1321 Digital Infrastructures
Modern PC operating systems
Chapter 5 File Systems -Compiled for MCA, PU
Presentation transcript:

1 X-Ways Security: Permanent Erasure Supervised By: Dr. Lo’ai Tawalbeh Prepared By :Murad M. Ali

2 Permanent Erasure (Shredding) File Shredding or File Wiping is the act of deleting a computer file securely, so that it cannot be restored by any means. This is done either using file shredder software, or by issuing a "secure delete" command, as opposed to a "delete" command from the operating system. File shredding usually involves overwriting a file multiple times.

3 Deleting When most computers delete a file, they do not actually remove the contents of the file. Instead, they simply unlink the file from the file directory system, leaving the contents of the file in the disk sectors. These data will remain there until the operating system reuses those sectors to write new data. Until the old data are overwritten (and this may take months or longer), it can be recovered by programs that read disk sectors directly, such as forensic software (so called because it is used to obtain evidence in criminal investigations and also in legal discovery).

4 Purpose of Deleting Data The reasons for deleting data: Need more disk space Removing duplicate or unnecessary data Removing sensitive information from others

5 Storing Data To delete data safely from a disk, it helps to understand how it gets there in the first place. The heart of a hard-disk is the platter, a set of highly polished plates, split into smaller parts called sectors. Data is stored on the disk magnetically, so you don't lose everything when you shut down the power. A read/write head, which looks like the arm of a record player, moves over the disk and writes information onto each platter. Every time data is written to the disk, a record is kept of the part of the platter on which it has been stored.

6 Storing Data

7 Recycle Bin provides a safety net when deleting files or folders. When you delete any of these items from your hard disk, Windows places it in the Recycle Bin and the Recycle Bin icon changes from empty to full. Items in the Recycle Bin remain there until you decide to permanently delete them from your computer. These items still take up hard disk space and can be undeleted or restored back to their original location. When it fills up, Windows automatically cleans out enough space in the Recycle Bin to accommodate the most recently deleted files and folders.

8 Recycle Bin If you're running low on hard disk space, always remember to empty the Recycle Bin. You can also restrict the size of the Recycle Bin to limit the amount of hard disk space it takes up. Windows allocates one Recycle Bin for each partition or hard disk. If your hard disk is partitioned, or if you have more than one hard disk in your computer, you can specify a different size for each Recycle Bin.

9 Accidental Removing The common problem with deleting files is accidental removal of information that later proves to be important. One way to deal with this is to backup files regularly. Another strategy is to move files to a temporary place where they are kept until one is really low on free space. This is how the "recycle bin" in Microsoft Windows and the "trash folder" in Mac OS work. Under Unix in order to delete a file, you must usually have write permission to the parent directory of that file.

10 Reasons of Use File wiping is useful for confidentiality, because files are not entirely deleted using the operating system's default delete function. Typically, standard delete functions consist of marking the space occupied by the file as free and updating file system metadata structures, leaving the actual file contents intact on the physical medium. If the file system continues to be used, eventually this space will be assigned to other files and overwritten. However, if the file system has not been used intensively since the file was deleted, recovery or forensic tools have a good likelihood of retrieving deleted data in part or in whole by accessing the medium.

11 Reasons of Use Some research in the field of magnetic storage media has indicated that it is theoretically possible to recover information from magnetic disks even after an overwrite, using hardware methods. File wiping with multiple overwrite passes was devised as an attempt to defeat such methods.

12 How It Work File Wipe programs work not only by unlinking a file but also specifically overwriting them with garbage data. For very high security installations, overwriting the file several times is advised. Many government institutions have specific protocols for file deletion. For instance, the U.S. Department of Defense (DoD) specification standard says a file must be overwritten three times. Wiping a file takes a considerably longer amount of time than just deleting it.

13 How It Work Besides destroying file's contents, some file wiping software also makes an attempt to ensure that, once wiping has been performed, no information about the file is left in the file system's metadata, such as directory entries. FAT file system, for example, only replaces the first character of the filename in the corresponding directory entry, when a file is removed. This may be a problem if the user doesn't want to leave traces, such as partial file name and, possibly, creation and modification dates on the physical medium. The solution to this problem is to wipe deleted entries in the directory containing the file after wiping the file itself.

14 Permanente Erasing Tools If you wants to be absolutely sure that the file is not recoverable by any means, a suggested approach is to burn the hard drive. Another approach is to destroy the media with acid. Although using file shredder software is sufficient to ensure that the data can't be recovered using commercially available tools by either the next owner of the computer, or by someone who has stolen the computer or the hard disk.

15 Software Tools X-Ways Security. File Shredder. East-Tec Eraser. Permanent Data Wiper. Blancco.

16 X-Ways Security X-Ways Security is a hard drive cleansing solution. To maximize security, X-Ways Security offers up to 9 fully configurable overwrite passes and the U.S. Department of Defense (DoD) standard for hard drive sanitization as specified in the M operating manual.

17 X-Ways Security Delete selected confidential files securely, such that they are not recoverable. Wipe free drive space and clear slack space, to get rid of sensitive data from deleted files. temporary files. Clean formerly used NTFS file records, which contain filenames and other data Erase logical drives or entire physical disks completely and irreversibly, e.g. to produce forensically clean target media or to sanitize media before re-use in a different environment of before donating.

18 References

19