Data Destruction is the process of erasure and (if need to) disposal of a set of data. We from Kreacio Media have many experts at Data Destruction and we can assist you by providing our best method that has been proven and tested by various clients.
Data Destruction Service by Kreacio Media is very environmental friendly. Moreover, you will also get a Certification of Erasure and Disposal by using our Data Destruction Service.
Understanding Data Sanitization
One of the most disturbing problem in this modern age is the Data Security. This is why people always guarded their Information Data zealously. Many big companies even spend millions of dollars just to safeguard their important data so it won’t be stolen of get in any mishaps.
The problem is, people only know how to safeguard their data properly, but they don’t know that to erase their data, people also need to follow certain rules and regulations. Knowing which security measure you need to do and how it works is the first step to protect your precious data.
Contrary to popular opinions, repartitioning a disk will not erase the data in a hard disk. Repartitioning a disk will only create a separation wall between the data inside the hard disk, while all files will still intact. In few cases where the some of the data got deleted, there are already multiple of programs that can restore it back.
The other popular way of deleting the disk content is by Reformatting the drive. This is also not entirely correct. Formatting a drive doesn’t mean all of the data are gone. Formatting is only modifying the Master File Table (MFT) which keep track of file contents position and verify each sector of the drive for consistency.
Even a Low-Level Format will not completely destroy all data. It will still leave a residual fingerprint which can be tracked. You can then fish it back using the popular Magnetic Force Microscopy technology after you found the data remnants. This is one of the reason why people are getting their data stolen even after deleting it.
The only proven way to permanently erase data is to overwrite all on-disk sectors with random patterns of ones and zeros, which is quite hard to do for people without sufficient knowledge and/or experience.
This permanent deletion of data is called Data Sanitization. This process is irreversible, meaning, after this process is done, you can no longer return back the data because it’s truly no longer there. Therefore, no forensic tools can return it back, providing total security for your data.
Data Security Standards that we use
To irreversibly destroy all on-disk information there have been developed a number of disk sanitizing standards. They are distinguished by wiping patterns and number of passes:
1. US DoD 5220.22-M. US Department of Defense recommends to overwrite all addressable locations with a character, its complement and then a random character. Finally, the target data area is to be verified;
2. US Navy standards NAVSO P-5239- 26.
– NAVSO P-5239- 26 for RLL encoded drives. At first to write the fixed value (0xffffffff) to the target data area, then the fixed value (0x27ffffff), and then random values. Finally, the target data area is to be verified;
– NAVSO P-5239- 26 for MFM encoded drives. At first to write the fixed value (0xffffffff) to the target data area, then the fixed value (0xbfffffff), and then random values. Finally, the target data area is to be verified;
3. British HMG Infosec Standard No.5. At first to write a single character pattern, then its complement and then a random character. Finally, the target data area is to be verified;
4. German VSItR Standard. Overwrite the deleted information 7 times, consistently filling it with the following patterns: 0x00, 0xFF, 0x00, 0xFF, 0x00, 0xFF, 0xAA. Finally, the target data area is to be verified;
5. Australian ASCI 33. Overwrite with a character (C), then verify. Overwrite with –C (the first pass character’s inverse), then verify again. Overwrite everything with both C and –C once again but without verification. Fill everything with random characters;
6. Russian GOST R 50739-95. Destroy information by a single pass with writing random characters into each sector byte;
7. Peter Gutmann’s algorithm. A whopping 35 passes, with 27 random-order passes using specific patterns combined with eight passes using random patterns;
8. Bruce Schneier’s algorithm. Two passes of specific patterns followed by five passes using a cryptographically secure pseudo-random sequence.