Can Data Stored on an SSD Be Secured? Computerworld (02/28/11) Lucas Mearian By: James Sutherland.

Slides:



Advertisements
Similar presentations
(nothing to see here). First thing you need to learn is that sysadmin is about people, not technology If youre a sysadmin so you dont have to deal with.
Advertisements

Driverless Cars By: Chris Broom. Summary The dream of a car that can drive itself has grown over the last decade as the necessary technologies have gradually.
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely P J Human Resources Pte Ltd presents:
Telling lies * Things to think about * What are lies?
Look at this receipt, the horrible and annoying 8.5% of sales tax that everyone forgets about is the government creation that bugs me the most in this.
John Coleman.  The title  The topics  Something different – a new framework  The burning questions  Where next?
SECURITY CHECK Protecting Your System and Yourself Source:
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
Save time with templates Create your own templates Say you often use a certain invoice whose basic content stays the same except for certain details that.
You could spend years and years figuring out how to take three steps at once. Or you could simply take one step, and then the next, and then the next.
NOT FOR SALE: Ethics in the Workplace.  Imagine you are a newly hired sales clerk in the Young Apparel department of a large department store. You are.
Year 7 Tutor Time Spring 1 Unit 3 Personal Safety.
Vote Hacking Kenny Denmark - October For an upcoming election, Washington D.C. was preparing a system to allow some voters to send in their ballots.
Created by Liat Rothfeld December 5, 2010 Begin Lily spent a whole class period creating an illustration in MS Paint. She went to File-Save, gave it.
Risk Assessment How do we know what we should be working on? This material was produced under grant SH from the Occupational Safety and Health.
Time Management. Use Your Time Productively You have about 40 minutes each period to get your work done. That’s plenty of time to get any of your homework.
The Cloud is Safe Pract The Facts. Backround: The recent hacking of the Cloud poses many issues with respect to Internet security. Just recently a hacker.
Web Security A how to guide on Keeping your Website Safe. By: Robert Black.
E-Safety Quiz Keeping safe online! A guide for parents & children.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Ergonomic Fix Ergonomics team changed design of part to completely eliminate this hazard No change in cost of part & cost savings of labor alone is $25,000.
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely presents:
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Pictures Matter Don’t let them get away. Photos are important – people run back into burning homes for them.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Safety! Jessica Brown. What Is the Point of Having an Online Space? It needs to be Safe Clean And Efficient.
Take this quiz to determine if you’re the next Bill Gates or whether you should just grin and bear it at your day job.
SSD: Cryptography. Learning Outcomes After the scenario has been completed, you are expected to be able to: Explain the relative strengths of encryption.
Covalent Bonding. Consider the Chlorine A single, neutral chlorine atom has 7 valence electrons: [Ne]3s 2 3p 5 As a Lewis Structure (aka, just an element.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
INTERNET SAFTEY AND CYBER BULLYING By your internet protection go to guys… Lukas Richters and Raymond Weaver.
Some Responses to Essential Questions
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
 You always need to have the latest anti- virus software so that you can prevent picking up unwanted virus’.  To prevent receiving junk mail, being.
This is a presentation about viruses, Hacking and back ups!! By Alice Daniels 7P.
BAD WORK HABITS Lory Warren © Copyright protected.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
CRYPTOGRAPHY. WHAT IS PUBLIC-KEY ENCRYPTION? Encryption is the key to information security The main idea- by using only public information, a sender can.
MY ONLINE CODE In the last 2 years of digital literacy I have learned the proper ways to act and why to act that way online, I have also learned other.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
ISPAB Panel on Usable Security Mary Frances Theofanos - NIST Ellen Cram Kowalczyk - Microsoft.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Lupe Alarcon Period 3.  My section is about the prevention of suicide, and how to help yourself and others considering suicide.  And what places to.
6 Figure Grid References L.O.By the end of today’s lesson I will be able to use 6 figure grid references accurately. Start Game? DELETE THIS Note for teachers:
Have fun on the internet while being safe!!  Do you know what cyber safety means?.. YesNo.
Four Illusions Trevor Kuhrt Psychology. Depth Perception The visual ability to perceive the world in 3D and the distance of an object.

Digital Footprint By Nicole Matonis. How might your digital footprint affect your future opportunities?
Explain one advantage and one disadvantage of solid sate storage over magnetic storage? By Liverpool and Southampton.
Dealing with Problems in Daily Life – Unit 337
Problem Solving Pages Information and Managerial Decisions The role of a manager is to LEAD, PLAN, ORGANIZE, CONTROL. One of their main jobs.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Safety on the Internet The most important rules to remember.
1.Your mobile phone is missing. What do you do? A Cry and feel sorry for yourself, convinced it’s gone for ever. ‘Why do these things always happen to.
Chapter 27 Project By: J.T. Brown O.D. Quinn B.M. Scapa K.R. Thomas.
Repetition Structures The long awaited …. Repetition Structures I repeat …
My Digital Footprint. How Might Your Digital Foot Print Effect Your Future Opportunities Your Digital Foot Print is an interesting trail that you could.
 Attempts to steal your identity since most people who use Facebook post personal information and click things without thinking about it.
Business Planning Top Ten Tips. Most small businesses fail because they have not researched their market thoroughly enough. You need to work out if there.
 This is nothing new and it is not your first year in school we are just continuing on from where you left off in elementary school. Basic Rules For Mr.
Student: Brianna Essaye Grade: M2 Subject: Health and Physical Education Teacher: Ms. Lindsay Spencer.
Introducing ‘Snap Maps’
Introduction to Computers
Important information update for Snapchat users
Hi, I’m Peanut! I shall give you top tips to stay safe online!
Working with Emotion in Family Law Cases Keeping Professional Distance while Using Emotion as a Client Management Tool.
Data Recovery: Why Secure Deletion is so Important.
Introducing ‘Snap Maps’
Presentation transcript:

Can Data Stored on an SSD Be Secured? Computerworld (02/28/11) Lucas Mearian By: James Sutherland

Summary Sanitizing SSDs (Solid State Drive) of data is at best a difficult task and at worst nearly impossible. Sanitizing SSDs (Solid State Drive) of data is at best a difficult task and at worst nearly impossible. Trying to figure out the best way to delete data off a SSD since data can be recovered off of them even when deleted. Trying to figure out the best way to delete data off a SSD since data can be recovered off of them even when deleted. Trying to balance user friendly deletion methods with methods that will guarantee user data will be safe. Trying to balance user friendly deletion methods with methods that will guarantee user data will be safe.

8-step ethical decision Step 1: The ethical issue is that user data is not safe on an SSD. The problem is that even when data is deleted, it can still be recovered off the disk. Step 1: The ethical issue is that user data is not safe on an SSD. The problem is that even when data is deleted, it can still be recovered off the disk. Step 2: The interested parties are people and companies that use SSD. They would hopefully like to see that their data that is stored on SSD are safe from others. Step 2: The interested parties are people and companies that use SSD. They would hopefully like to see that their data that is stored on SSD are safe from others. Step 3: A) A harsh solution would be to burn the cards after you are done with them. That is impractical to some people and would be pretty annoying. B) Never delete any data off a SSD so then there is no confusion on whether something is deleted or not. C) Come up with a better plan for deleting data. Step 3: A) A harsh solution would be to burn the cards after you are done with them. That is impractical to some people and would be pretty annoying. B) Never delete any data off a SSD so then there is no confusion on whether something is deleted or not. C) Come up with a better plan for deleting data.

8-step ethical decision Step 4: The best solution is A and that is the best solution to guarantee data does not exist. Some people would oppose to a rash method but it is guaranteed to work. Step 4: The best solution is A and that is the best solution to guarantee data does not exist. Some people would oppose to a rash method but it is guaranteed to work. Step 5: There is nothing wrong with wanting data deleted. Step 5: There is nothing wrong with wanting data deleted. Step 6: People would like to know that their data is safe and would not always like to go to extreme measures to guarantee that. Some people would like to click, delete, and be done with it. Step 6: People would like to know that their data is safe and would not always like to go to extreme measures to guarantee that. Some people would like to click, delete, and be done with it. Step 7: I would personally always use my method because I don’t have to question if data exists or not. Step 7: I would personally always use my method because I don’t have to question if data exists or not. Step 8: Plenty of people have used this method of deletion and they wouldn’t complain about their data being stolen. Step 8: Plenty of people have used this method of deletion and they wouldn’t complain about their data being stolen.

ACM Code The safety of data on a SSD is important to the public and not being able to guarantee data deletion is putting the public at risk. The safety of data on a SSD is important to the public and not being able to guarantee data deletion is putting the public at risk. Since being able to trust people won’t steal data, we should be able to trust that data we do not want others to look at is gone. Since being able to trust people won’t steal data, we should be able to trust that data we do not want others to look at is gone. Once we can guarantee data is safe, we can fulfill our part of the ACM code of keeping the public safe. Once we can guarantee data is safe, we can fulfill our part of the ACM code of keeping the public safe.