Data remanence is the residual representation of digital data that remains even after attempts have been made to remove or erase the data. This residue may result from data being left intact by a nominal file deletion operation, by reformatting of storage media that does not remove data previously written to the media, or through physical properties of the storage media that allow previously written data to be recovered. Data remanence may make inadvertent disclosure of sensitive information possible should the storage media be released into an uncontrolled environment (e.g., thrown in the bin (trash) or lost).
Effective application of countermeasures can be complicated by several factors, including media that are inaccessible, media that cannot effectively be erased, advanced storage systems that maintain histories of data throughout the data's life cycle, and persistence of data in memory that is typically considered volatile.
Several standards exist for the secure removal of data and the elimination of data remanence.
Causes
Many operating systems, file managers, and other software provide a facility where a file is not immediately deleted when the user requests that action. Instead, the file is moved to a holding area (i.e. the "trash"), making it easy for the user to undo a mistake. Similarly, many software products automatically create backup copies of files that are being edited, to allow the user to restore the original version, or to recover from a possible crash (autosave feature).
Even when an explicit deleted file retention facility is not provided or when the user does not use it, operating systems do not actually remove the contents of a file when it is deleted unless they are aware that explicit erasure commands are required, like on a solid-state drive. (In such cases, the operating system will issue the Serial ATATRIM command or the SCSI UNMAP command to let the drive know to no longer maintain the deleted data.) Instead, they simply remove the file's entry from the file systemdirectory because this requires less work and is therefore faster, and the contents of the file—the actual data—remain on the storage medium. The data will remain there until the operating system reuses the space for new data. In some systems, enough filesystem metadata are also left behind to enable easy undeletion by commonly available utility software. Even when undelete has become impossible, the data, until it has been overwritten, can be read by software that reads disk sectors directly. Computer forensics often employs such software.
Likewise, reformatting, repartitioning, or reimaging a system is unlikely to write to every area of the disk, though all will cause the disk to appear empty or, in the case of reimaging, empty except for the files present in the image, to most software.
Finally, even when the storage media is overwritten, physical properties of the media may permit recovery of the previous contents. In most cases however, this recovery is not possible by just reading from the storage device in the usual way, but requires using laboratory techniques such as disassembling the device and directly accessing/reading from its components.
§ Complications below gives further explanations for causes of data remanence.
There are three levels commonly recognized for eliminating remnant data:
Clearing
Clearing is the removal of sensitive data from storage devices in such a way that there is assurance that the data may not be reconstructed using normal system functions or software file/data recovery utilities. The data may still be recoverable, but not without special laboratory techniques.[1]
Clearing is typically an administrative protection against accidental disclosure within an organization. For example, before a hard drive is re-used within an organization, its contents may be cleared to prevent their accidental disclosure to the next user.
Purging
Purging or sanitizing is the physical rewrite of sensitive data from a system or storage device done with the specific intent of rendering the data unrecoverable at a later time.[2] Purging, proportional to the sensitivity of the data, is generally done before releasing media beyond control, such as before discarding old media, or moving media to a computer with different security requirements.
Destruction
The storage media is made unusable for conventional equipment. Effectiveness of destroying the media varies by medium and method. Depending on recording density of the media, and/or the destruction technique, this may leave data recoverable by laboratory methods. Conversely, destruction using appropriate techniques is the most secure method of preventing retrieval.
Specific methods
Overwriting
A common method used to counter data remanence is to overwrite the storage media with new data. This is often called wiping or shredding a disk or file, by analogy to common methods of destroying print media, although the mechanism bears no similarity to these. Because such a method can often be implemented in software alone, and may be able to selectively target only part of the media, it is a popular, low-cost option for some applications. Overwriting is generally an acceptable method of clearing, as long as the media is writable and not damaged.
The simplest overwrite technique writes the same data everywhere—often just a pattern of all zeros. At a minimum, this will prevent the data from being retrieved simply by reading from the media again using standard system functions.
In an attempt to counter more advanced data recovery techniques, specific overwrite patterns and multiple passes have often been prescribed. These may be generic patterns intended to eradicate any trace signatures; an example is the seven-pass pattern 0xF6, 0x00, 0xFF, <random byte>, 0x00, 0xFF, <random byte>, sometimes erroneously attributed to US standard DOD 5220.22-M.
One challenge with overwriting is that some areas of the disk may be inaccessible, due to media degradation or other errors. Software overwrite may also be problematic in high-security environments, which require stronger controls on data commingling than can be provided by the software in use. The use of advanced storage technologies may also make file-based overwrite ineffective (see the related discussion below under § Complications).
There are specialized machines and software that are capable of doing overwriting. The software can sometimes be a standalone operating system specifically designed for data destruction. There are also machines specifically designed to wipe hard drives to the department of defense specifications DOD 5220.22-M.[3]
Feasibility of recovering overwritten data
Peter Gutmann investigated data recovery from nominally overwritten media in the mid-1990s. He suggested magnetic force microscopy may be able to recover such data, and developed specific patterns, for specific drive technologies, designed to counter such.[4] These patterns have come to be known as the Gutmann method. Gutmann's belief in the possibility of data recovery is based on many questionable assumptions and factual errors that indicate a low level of understanding of how hard drives work. [5]
Daniel Feenberg, an economist at the private National Bureau of Economic Research, claims that the chances of overwritten data being recovered from a modern hard drive amount to "urban legend".[6] He also points to the "18+1⁄2-minute gap" Rose Mary Woods created on a tape of Richard Nixon discussing the Watergate break-in. Erased information in the gap has not been recovered, and Feenberg claims doing so would be an easy task compared to recovery of a modern high density digital signal.
On the other hand, according to the 2014 NIST Special Publication 800-88 Rev. 1 (p. 7): "For storage devices containing magnetic media, a single overwrite pass with a fixed pattern such as binary zeros typically hinders recovery of data even if state of the art laboratory techniques are applied to attempt to retrieve the data."[8] An analysis by Wright et al. of recovery techniques, including magnetic force microscopy, also concludes that a single wipe is all that is required for modern drives. They point out that the long time required for multiple wipes "has created a situation where many organizations ignore the issue [altogether] – resulting in data leaks and loss."[9]
Degaussing
Degaussing is the removal or reduction of a magnetic field of a disk or drive, using a device called a degausser that has been designed for the media being erased. Applied to magnetic media, degaussing may purge an entire media element quickly and effectively.
Degaussing often renders hard disks inoperable, as it erases low-level formatting that is only done at the factory during manufacturing. In some cases, it is possible to return the drive to a functional state by having it serviced at the manufacturer. However, some modern degaussers use such a strong magnetic pulse that the motor that spins the platters may be destroyed in the degaussing process, and servicing may not be cost-effective. Degaussed computer tape such as DLT can generally be reformatted and reused with standard consumer hardware.
In some high-security environments, one may be required to use a degausser that has been approved for the task. For example, in US government and military jurisdictions, one may be required to use a degausser from the NSA's "Evaluated Products List".[10]
Encryption
Encrypting data before it is stored on the media may mitigate concerns about data remanence. If the decryption key is strong and carefully controlled, it may effectively make any data on the media unrecoverable. Even if the key is stored on the media, it may prove easier or quicker to overwrite just the key, versus the entire disk. This process is called crypto-shredding.
Other side-channel attacks (such as keyloggers, acquisition of a written note containing the decryption key, or rubber-hose cryptanalysis) may offer a greater chance of success, but do not rely on weaknesses in the cryptographic method employed. As such, their relevance for this article is minor.
Media destruction
Thorough destruction of the underlying storage media is the most certain way to counter data remanence. However, the process is generally time-consuming, cumbersome, and may require extremely thorough methods, as even a small fragment of the media may contain large amounts of data.
Phase transition (e.g., liquefaction or vaporization of a solid disk)
For magnetic media, raising its temperature above the Curie point
For many electric/electronic volatile and non-volatile storage media, exposure to electromagnetic fields greatly exceeding safe operational specifications (e.g., high-voltage electric current or high-amplitude microwave or ionizing radiation)[citation needed]
Complications
Inaccessible media areas
Storage media may have areas which become inaccessible by normal means. For example, magnetic disks may develop new bad sectors after data has been written, and tapes require inter-record gaps. Modern hard disks often feature reallocation of marginal sectors or tracks, automated in a way that the operating system would not need to work with it. The problem is especially significant in solid-state drives (SSDs) that rely on relatively large relocated bad block tables. Attempts to counter data remanence by overwriting may not be successful in such situations, as data remnants may persist in such nominally inaccessible areas.
Advanced storage systems
Data storage systems with more sophisticated features may make overwrite ineffective, especially on a per-file basis. For example, journaling file systems increase the integrity of data by recording write operations in multiple locations, and applying transaction-like semantics; on such systems, data remnants may exist in locations "outside" the nominal file storage location. Some file systems also implement copy-on-write or built-in revision control, with the intent that writing to a file never overwrites data in-place. Furthermore, technologies such as RAID and anti-fragmentation techniques may result in file data being written to multiple locations, either by design (for fault tolerance), or as data remnants.
Wear leveling can also defeat data erasure, by relocating blocks between the time when they are originally written and the time when they are overwritten. For this reason, some security protocols tailored to operating systems or other software featuring automatic wear leveling recommend conducting a free-space wipe of a given drive and then copying many small, easily identifiable "junk" files or files containing other nonsensitive data to fill as much of that drive as possible, leaving only the amount of free space necessary for satisfactory operation of system hardware and software. As storage and system demands grow, the "junk data" files can be deleted as necessary to free up space; even if the deletion of "junk data" files is not secure, their initial nonsensitivity reduces to near zero the consequences of recovery of data remanent from them.[citation needed]
Optical media
As optical media are not magnetic, they are not erased by conventional degaussing. Write-once optical media (CD-R, DVD-R, etc.) also cannot be purged by overwriting. Rewritable optical media, such as CD-RW and DVD-RW, may be receptive to overwriting. Methods for successfully sanitizing optical discs include delaminating or abrading the metallic data layer, shredding, incinerating, destructive electrical arcing (as by exposure to microwave energy), and submersion in a polycarbonate solvent (e.g., acetone).
Data on solid-state drives
Research from the Center for Magnetic Recording and Research, University of California, San Diego has uncovered problems inherent in erasing data stored on solid-state drives (SSDs). Researchers discovered three problems with file storage on SSDs:[11]
First, built-in commands are effective, but manufacturers sometimes implement them incorrectly. Second, overwriting the entire visible address space of an SSD twice is usually, but not always, sufficient to sanitize the drive. Third, none of the existing hard drive-oriented techniques for individual file sanitization are effective on SSDs.[11]: 1
Solid-state drives, which are flash-based, differ from hard-disk drives in two ways: first, in the way data is stored; and second, in the way the algorithms are used to manage and access that data. These differences can be exploited to recover previously erased data. SSDs maintain a layer of indirection between the logical addresses used by computer systems to access data and the internal addresses that identify physical storage. This layer of indirection hides idiosyncratic media interfaces and enhances SSD performance, reliability, and lifespan (see wear leveling), but it can also produce copies of the data that are invisible to the user and that a sophisticated attacker could recover. For sanitizing entire disks, sanitize commands built into the SSD hardware have been found to be effective when implemented correctly, and software-only techniques for sanitizing entire disks have been found to work most, but not all, of the time.[11]: section 5 In testing, none of the software techniques were effective for sanitizing individual files. These included well-known algorithms such as the Gutmann method, US DoD 5220.22-M, RCMP TSSIT OPS-II, Schneier 7 Pass, and Secure Empty Trash on macOS (a feature included in versions OS X 10.3-10.9).[11]: section 5
The TRIM feature in many SSD devices, if properly implemented, will eventually erase data after it is deleted[12][citation needed], but the process can take some time, typically several minutes. Many older operating systems do not support this feature, and not all combinations of drives and operating systems work.[13]
Data in RAM
Data remanence has been observed in static random-access memory (SRAM), which is typically considered volatile (i.e., the contents degrade with loss of external power). In one study, data retention was observed even at room temperature.[14]
Data remanence has also been observed in dynamic random-access memory (DRAM). Modern DRAM chips have a built-in self-refresh module, as they not only require a power supply to retain data, but must also be periodically refreshed to prevent their data contents from fading away from the capacitors in their integrated circuits. A study found data remanence in DRAM with data retention of seconds to minutes at room temperature and "a full week without refresh when cooled with liquid nitrogen."[15] The study authors were able to use a cold boot attack to recover cryptographic keys for several popular full disk encryption systems, including Microsoft BitLocker, Apple FileVault, dm-crypt for Linux, and TrueCrypt.[15]: 12
Despite some memory degradation, authors of the above described study were able to take advantage of redundancy in the way keys are stored after they have been expanded for efficient use, such as in key scheduling. The authors recommend that computers be powered down, rather than be left in a "sleep" state, when not in physical control of the owner. In some cases, such as certain modes of the software program BitLocker, the authors recommend that a boot password or a key on a removable USB device be used.[15]: 12 TRESOR is a kernelpatch for Linux specifically intended to prevent cold boot attacks on RAM by ensuring that encryption keys are not accessible from user space and are stored in the CPU rather than system RAM whenever possible. Newer versions of the disk encryption software VeraCrypt can encrypt in-RAM keys and passwords on 64-bit Windows.[16]
Standards
Australia
ASD ISM 2014, Australian Government Information Security Manual, 2014 [17]
Canada
RCMP B2-002, IT Media Overwrite and Secure Erase Products, May 2009 [18]
NIST Special Publication 800-88, Guidelines for Media Sanitization, September 2006 [1]
DoD 5220.22-M, National Industrial Security Program Operating Manual (NISPOM), February 2006 [22]
Current editions no longer contain any references to specific sanitization methods. Standards for sanitization are left up to the Cognizant Security Authority.[22]
Although the NISPOM text itself never described any specific methods for sanitization, past editions (1995 and 1997)[23] did contain explicit sanitization methods within the Defense Security Service (DSS) Clearing and Sanitization Matrix inserted after Section 8-306. The DSS still provides this matrix and it continues to specify methods.[7] As of the Nov 2007 edition of the matrix, overwriting is no longer acceptable for sanitization of magnetic media. Only degaussing (with an NSA approved degausser) or physical destruction is acceptable.
^Wright, Craig; Kleiman, Dave; Shyaam, Sundhar R.S. (December 2008). "Overwriting Hard Drive Data: The Great Wiping Controversy". Information Systems Security. Lecture Notes in Computer Science. Vol. 5352. Springer Berlin / Heidelberg. pp. 243–257. doi:10.1007/978-3-540-89862-7_21. ISBN978-3-540-89861-0.
American photographer (1865–1936) Autochrome of Eugene by Alfred Stieglitz, 1907 Frank Eugene (Born Frank Eugene Smith; 19 September 1865 – 16 December 1936) was an American-born photographer who was a founding member of the Photo-Secession and one of the first university-level professors of photography in the world. Early life Eugene was born in New York City as Frank Eugene Smith. His father was Frederick Smith, a German baker who changed his last name from Schmid after moving to Americ...
Integrated circuit technology Neuromorphic computing is an approach to computing that is inspired by the structure and function of the human brain.[1][2][3] A neuromorphic computer/chip is any device that uses physical artificial neurons to do computations.[4][5] In recent times, the term neuromorphic has been used to describe analog, digital, mixed-mode analog/digital VLSI, and software systems that implement models of neural systems (for perception, m...
Scottish National Party politician John MasonMSPDeputy Convener of the Finance CommitteeIncumbentAssumed office 15 June 2011Preceded byTom McCabeMember of the Scottish Parliament for Glasgow ShettlestonIncumbentAssumed office 5 May 2011Preceded byFrank McAveetyMajority8,025 (25.0%)[1]Member of Parliament for Glasgow EastIn office24 July 2008 – 12 April 2010Preceded byDavid MarshallSucceeded byMargaret CurranGlasgow City Councillor for:Garrowhill (Ward 48) (1998–20...
Artikel ini terlalu bergantung pada referensi dari sumber primer. Mohon perbaiki artikel ini dengan menambahkan sumber sekunder atau tersier. (Pelajari cara dan kapan saatnya untuk menghapus pesan templat ini) PT Surya Esa Perkasa TbkNama dagangEssaJenisPerseroan terbatasKode emitenIDX: ESSAIndustriMinyak dan gasDidirikan24 Maret 2006; 17 tahun lalu (2006-03-24)KantorpusatJakarta, IndonesiaWilayah operasiIndonesiaTokohkunciChander Vinod Laroya[1](Direktur Utama)Hamid Awaluddin ...
العلاقات المجرية الهايتية المجر هايتي المجر هايتي تعديل مصدري - تعديل العلاقات المجرية الهايتية هي العلاقات الثنائية التي تجمع بين المجر وهايتي.[1][2][3][4][5] مقارنة بين البلدين هذه مقارنة عامة ومرجعية للدولتين: وجه المقارنة المجر هايتي ال
هذه المقالة يتيمة إذ تصل إليها مقالات أخرى قليلة جدًا. فضلًا، ساعد بإضافة وصلة إليها في مقالات متعلقة بها. (سبتمبر 2018) برامج التعرف على الطفل الماسونية (CHIP) هي مبادرة خيرية من قبل المحافل الماسونية في أمريكا الشمالية للمساعدة في الكشف عن هوية الأطفال المفقودين واستعادتهم . يت
In the differential geometry of surfaces, a Darboux frame is a natural moving frame constructed on a surface. It is the analog of the Frenet–Serret frame as applied to surface geometry. A Darboux frame exists at any non-umbilic point of a surface embedded in Euclidean space. It is named after French mathematician Jean Gaston Darboux. Darboux frame of an embedded curve Let S be an oriented surface in three-dimensional Euclidean space E3. The construction of Darboux frames on S first cons...
This article includes a list of general references, but it lacks sufficient corresponding inline citations. Please help to improve this article by introducing more precise citations. (April 2019) (Learn how and when to remove this template message) Madla-bygg-ferdig-W Vaaland-kunst Artwork on the side of the Aberdeen Market Unicorn by Portuguese street artist Artur Bordalo (BordaloII) at NuArt Festival Aberdeen (2018) The NuArt Festival is an annual Street Art festival traditionally held in S...
Lesoto Este artigo é parte da série: Política e governo doLesoto Rei Letsie III Primeiro-Ministro Pakalitha Mosisili Parlamento Senado Assembleia Nacional Partidos políticos Eleições: 2007 Distritos Relações Exteriores Atlasverdiscutireditar
Annual international film festival in North Macedonia This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages) This article relies largely or entirely on a single source. Relevant discussion may be found on the talk page. Please help improve this article by introducing citations to additional sources.Find sources: Manaki Brothers Film Festival – news · newspapers · boo...
Scottish physician and botanist (1829–1880) Dr William Lauder Lindsay FRSE FLS LRCS (19 December 1829-24 November 1880) was a Scottish physician and botanist. As a physician he largely worked in the field of mental health. As a botanist he specialised in lichens. Life The grave of William Lauder Lindsay, Dean Cemetery, Edinburgh He was born on 19 December 1829 at 20 Gardners Crescent[1] in western Edinburgh the son of Helen Baird Lauder (1804-1883) and her husband James Lindsay of R...
Sângeorz-BăiKotaLetak Sângeorz-BăiNegara RumaniaProvinsiBistriţa-NăsăudStatusKotaPemerintahan • Wali kotaRoland-Marius Venig (Partidul Social Democrat)Luas • Total146,21 km2 (5,645 sq mi)Populasi (2002) • Total10.224Zona waktuUTC+2 (EET) • Musim panas (DST)UTC+3 (EEST) Sângeorz-Băi (juga dieja: Sîngeorz-Băi, Hungaria: Oláhszentgyörgy) adalah kota yang terletak di provinsi Bistriţa-Năsăud, Transilvania, Ru...
Shaoxing MetroOverviewLocaleShaoxing, Zhejiang Province, ChinaTransit typeRapid transitNumber of lines2Number of stations37Daily ridership20,000 (daily ave. 2021)Websitewww.sxsmtr.cnOperationBegan operation28 June 2021; 2 years ago (2021-06-28)[1]Operator(s)Shaoxing Rail Transit Group Co., Ltd.TechnicalSystem length57.8 km (35.9 mi) (in operation)Track gauge1,435mm System map Shaoxing Metro (Chinese: 绍兴轨道交通; pinyin: Shàoxīng Guǐdào J...
Burundi nos Jogos Olímpicos de Verão da Juventude de 2010 Comitê Olímpico Nacional Código do COI BDI Nome Comité National Olympique du Burundi Jogos Olímpicos de Verão da Juventude de 2010 Sede Singapura Competidores 4 em 1 esporte Porta-bandeira Zabulon Ndikumana[1] Medalhas Pos.n/d 0 0 0 0 Participações nos Jogos Olímpicos Verão 1996 • 2000 • 2004 • 2008 • 2012 • 2016 • 2020 O Burundi participou dos Jogos Olímpicos de Verão da Juventude de 2010 em Singapu...
Fifth version of the Android operating system Android EclairVersion of the Android operating systemScreenshotAndroid 2.1 running on a Nexus OneDeveloperGoogleInitial releaseOctober 27, 2009; 14 years ago (2009-10-27)[1]Final release2.1_r2.1p2 (EPF21B)[2][3] / January 12, 2010; 13 years ago (2010-01-12)Kernel typeMonolithic Kernel (Linux Kernel)Preceded byAndroid 1.6 DonutSucceeded byAndroid 2.2 FroyoOfficial websitedeveloper.android....
South Korean singer This article is about the female singer-songwriter. For the South Korean band, see Cheeze (band). Cheeze임혜경BornIm Hye-kyung (1991-08-19) August 19, 1991 (age 32)South KoreaOccupationSingerMusical careerInstrument(s)VocalsYears active2011–presentLabelsMagic Strawberry SoundWebsitewww.msbsound.com CheezeHangul달총Revised RomanizationDalchongMcCune–ReischauerTalch'ong Im Hye-kyung (Korean: 임혜경, born August 19, 1991),[1] better known by ...
1994 studio album by Wild ColonialsFruit of LifeStudio album by Wild ColonialsReleased1994Recorded1993 at Real World Studios, Box, Wiltshire, England and at Sunset Sound Factory, Hollywood, California, U.S.GenreFolk rock[1]Length56:01LabelDGC[2]ProducerTchad BlakeWild Colonials chronology Fruit of Life(1994) This Can't Be Life(1996) Fruit of Life is an album by the Wild Colonials, released in 1994.[3][4] Spark was released as a single and was a radio hi...
This article relies largely or entirely on a single source. Relevant discussion may be found on the talk page. Please help improve this article by introducing citations to additional sources.Find sources: Tokyo Xtreme Racer video game – news · newspapers · books · scholar · JSTOR (March 2010) 1999 video gameTokyo Xtreme RacerNorth American Dreamcast cover artDeveloper(s)GenkiPublisher(s)Genki (Japan)Crave Entertainment (NA/EU)Ubi Soft (EU)SeriesSh...
This article does not cite any sources. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: DJMax Trilogy – news · newspapers · books · scholar · JSTOR (January 2009) (Learn how and when to remove this template message) 2008 video gameDJMax TrilogyDeveloper(s)PentavisionPublisher(s)Neowiz GamesDesigner(s)Forte EscapeSeriesDJMaxPlatform(s)Microsoft WindowsReleaseDecembe...