Security StrategiesThis newsletter is sponsored by NetcordiaNetwork World's Security Strategies Newsletter, 08/02/07Disk data remanence: Part 1By M. E. KabayThis is the first of two articles looking at disk-drive sanitization. Discarded disk drives with fully readable information have repeatedly been found for sale by computer resellers, at auctions, at used-equipment exchanges, on eBay (you might enjoy an animation of Chumbawamba’s song of that name on YouTube) and even at flea markets and yard sales. One of the most important formal studies of the problem was published in the January/February issue of _IEEE Security & Privacy_ by Garfinkel & Shelat. Renowned computer science professor Dr. Simson L. Garfinkel has a long history of contributions to information assurance. He is currently Associate Professor at the Naval Postgraduate School in Monterey, Calif., and a fellow at the Center for Research on Computation and Society at Harvard University. Dr. Abhi Shelat is a researcher in computer science at the IBM Zurich Research Lab and is particularly active in cryptography research. The authors reported on the many failed attempts to destroy data on (“sanitize”) disk drives, including: erasure (leaves data almost entirely intact), overwriting (good enough or even perfect but not always properly applied), physical destruction (evidently renders what’s left of the drive unusable), and degaussing (using strong magnetic fields to distort the magnetic domains into unreadability).
With regard to ordinary file-system formatting, the authors said that “most operating system format commands only write a minimal disk file system; they do not rewrite the entire disk. To illustrate this assertion, we took a 10-Gbyte hard disk and filled every block with a known pattern. We then initialized a disk partition using the Windows 98 FDISK command and formatted the disk with the format command. After each step, we examined the disk to determine the number of blocks that had been written. . . . Users might find these numbers discouraging: despite warnings from the operating system to the contrary, the format command overwrites barely more than 0.1% of the disk’s data. Nevertheless, the command takes more than eight minutes to do its job on the 10-Gbyte disk—giving the impression that the computer is actually overwriting the data. In fact, the computer is attempting to read all of the drive’s data so it can build a bad-block table. The only blocks that are actually written during the format process are those that correspond to the boot blocks, the root directory, the file allocation table, and a few test sectors scattered throughout the drive’s surface.” The most significant aspect of their work was their field research. From November 2000 through August 2002, they bought 158 used disk drives from many types of sources and studied the data they found on the drives. Using special analytical tools, the scientists found a total of 75GB of readable data. The full report goes into a great deal of detail, but the essential information for purposes of this brief article is from their last paragraph: “With several months of work and relatively little financial expenditure, we were able to retrieve thousands of credit card numbers and extraordinarily personal information on many individuals. We believe that the lack of media reports about this problem is simply because, at this point, few people are looking to repurposed hard drives for confidential material. If sanitization practices are not significantly improved, it’s only a matter of time before the confidential information on repurposed hard drives is exploited by individuals and organizations that would do us harm.” In my next article, I’ll introduce an interesting product that I just learned about recently that may help overcome the problem of disk data remanence using an organized and documented method.
|
Contact the author: M. E. Kabay, Ph.D., CISSP-ISSMP, is Associate Professor of Information Assurance and CTO of the School of Graduate Studies at Norwich University in Northfield, Vt. Mich can be reached by e-mail and his Web site. This newsletter is sponsored by NetcordiaARCHIVEArchive of the Security Strategies Newsletter. BONUS FEATUREIT PRODUCT RESEARCH AT YOUR FINGERTIPS Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details. PRINT SUBSCRIPTIONS AVAILABLE International subscribers, click here. SUBSCRIPTION SERVICESTo subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here. This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription. Advertising information: Write to Associate Publisher Online Susan Cardoza Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 Copyright Network World, Inc., 2007 |
No comments:
Post a Comment