In my last post, I discussed the creation and use of a bootable Windows CD using the Ultimate Boot CD for Windows...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
(UBCD). The disk provides an on-demand operating system that is both familiar and trusted (known-good and non-compromised), and is a flexible and useful tool that no IT worker should be without. Now let's look at the value of one specific data destruction tool that happens to be on that bootable CD: "Darik's Boot and Nuke", or DBAN.
A critical but often overlooked security issue is the data on hard drives when a computer is reassigned or discarded. Neither reinstalling Windows nor reformatting the drive will destroy the data on that drive. Combine this with the rather obvious fact that computers (technically, the hard drives) contain sensitive data, and we have a potential disaster.
If, for example, someone in human resources leaves the company, the computer and hard drive they leave behind is likely to contain personal information, such as Social Security numbers, salary figures and perhaps a list of people terminated for cause. If that computer is simply discarded, or sent for electronics recycling, that hard drive may end up on eBay or sent to a developing nation for reuse. That confidential data can then be recovered -- sometimes very easily -- by someone who would abuse it. If this scenario seems far-fetched, a little research will show you several examples of this exact scenario happening to sensitive information, including U.S. defense data and U.K. bank details.
DBAN features a convenient 'autonuke' option, which will prompt you with a few defaults and, once accepted, will begin to erase the drive. Although the software can overwrite each sector of the disk multiple times (multiple-pass), for most non-governmental organizations, a single pass is sufficient. One pass is quicker than multiple, and the data will be gone for all practical purposes.
To be explicitly clear -- DBAN and the steps I have described will completely and securely destroy, or erase, a hard drive. Absolutely all data on the hard drive will be overwritten by this tool: the operating system, documents and programs will be gone. If you only want to erase specific files or the unused (unallocated) portion of a drive you need to use a different tool. There are many options to selectively erase files, both commercial and free. Eraser, which is also part of UBCD, is one such tool. Unlike DBAN, Eraser will not destroy everything on a drive, leaving the normal, allocated files alone.
Lastly, there are numerous options for disk erasure programs, and it is probably worth your time to explore a few options. Most disk encryption tools include an erasure option as do some antivirus suites. DBAN and Eraser, however, are quick, easy to use, free, and already included on that bootable Windows utility CD you've created.
Erasing those old hard drives, even when re-provisioning a computer for a new user, may seem like a lot of work, but it can save you, and your company, a lot of embarrassment and legal problems. If, for example, you re-provision a computer to a new user without erasing the data, the new user may have access to the prior user's information. That information could contain sensitive personal documents -- copies of paystubs, a mortgage application, or letters to a divorce lawyer. The unintentional distribution of this information on a re-positioned or discarded hard drive could pose legal risk to your company or could expose company secrets (such as the salary of every employee).
In my next post, I will discuss ways to protect sensitive data (perhaps when the sensitive computer is lost or stolen) using disk encryption.
About the author
Tom Chmielarski is a senior consultant with GlassHouse Technologies, Inc.
Send comments on this technical tip to email@example.com.