Advertisement

Data Sanitization

Data Sanitization 0:00:00
Intro:
Data Sanitization is a process to permanently delete the data from a storage media in such a manner that this data is not recoverable even by using advanced forensic tools. In this video I will discuss different techniques which we may use for data Sanitization including their pros and cons.
0:00:40
Why Data Sanitization:
We perform data sanitization, once we no longer need the IT asset/ storage media/ data, may be the IT asset is at its end of life, or maybe we want to sale/ donate this IT asset/ storage media to an external party, or we may want to de-classify storage media/ IT asset, to use the same in a different environment, or the environment of lower classification than the existing environment where this IT asset is being used.
0:02:46
Sanitization Types:
0:03:57
Erasing:
Erasing is simply deleting the links to the data and data
0:05:26.
Clearing:
Clearing is the overwriting of the data (Electronic shredding/ Wiping).
0:07:09
Degaussing:
Degaussing is for magnetic media and in this process we use a powerful magnetic field to realign or rewrite the magnetic field of magnetic storage media.
0:08:38
Purging:
Purging is the combination of Clearing and Degaussing. It is an intense form of clearing and the objective over here is to reuse the sanitized media in a less secure environment. Purging involves multiple overwrites, in combination with degaussing (or any other technique).
0:09:56
Destruction:
Destruction is the ultimate technique or the most secure technique for data sanitization and it is valid for Top Secret data or systems which we may not want to use in any environment (less secure), or we may not want to sell/ donate to external party. So we just want to dispose-off this system (final stage of its life cycle).

Reference
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 8th: Edition:
Eleventh Hour CISSP: Study Guide:

NIST Special Publication 800-88, Revision 1: Guidelines for Media Sanitization:


Links to Channel's Playlists
Information Security Management:
Network Security:
Information Security Architecture:
Information Security Operations:
Information Security Testing:
Application Security:
Cyber Security:

Subscribe to Channel:

Data Sanitization,media Sanitization,Purging,Deleting,Erasing,Clearing,Degaussing,Media Destruction,Incineration,Pulverizing,Shredding,Electronic Shredding,Wiping,Formating,Data overwritting,

Post a Comment

0 Comments