NCJ Number
153550
Journal
Security Management Volume: 39 Issue: 2 Dated: (February 1995) Pages: 29,30,32
Date Published
1995
Length
3 pages
Annotation
Security managers must determine appropriate methods of destruction of computer data, because data stored on magnetic disks and tapes is hard to destroy permanently and well-known systems of erasure and destruction may be effective against only unskilled or inexperienced searchers.
Abstract
Files deleted from a computer are not really gone; they are often easy and inexpensive to recover. Even seemingly effective methods of erasure or destruction (overwriting the file, formatting the disk, degaussing and cutting up the disk) may not completely expunge data. Information protection methods that can frustrate a local competitor may fail against international attackers with larger budgets with larger budgets and more sophisticated operations. Possible approaches to reducing the vulnerability of data include the encryption of sensitive files, frequent overwriting of files, avoidance of virtual memory, precautions when traveling, and establishment of definite procedures for the disposal and repair of magnetic media and computers.