- Ivy Zhang
- Issue Time
Some of the most common methods of data destruction include physical destruction, degaussing, and overwriting. Physical destruction involves physically destroying the storage device or media on which the data is stored. This can be done by crushing, shredding, or incinerating the device or media.
Because the tape can be repeated use, on the surface of the current data is behind a overwrite data in the past, even if they could through software for data reduction, along with the increase in number of written, unstructured data recovery, need to interpret the longer time, enterprise can assess whether can bear the risk of data to be recovery.
Among them, the low degree is to completely overwrite the tape or disk;
For high degree, it is required to comply with the DoD 5220-22-M security certification program, and combine several cleaning and overwriting programs, so that every space of the hard disk can be repeatedly cleaned and overwritten.
Method 2: Demagnetization method
Storage media, such as disks or tapes, are magnetic technologies, and if their magnetic structure can be destroyed, the existing data will no longer exist.
Research by the executive yuan will archives about destruction of the data is complete, the unit senior inspection Li Yanxi says archives refresh the file data storage media, or must be destroyed in accordance with the data, and so on, whether it is a disk or tape, first of all, is the first degaussing action, let the data stored in the media, can make it disappear completely.
General enterprises can buy small degaussing machine to do a single roll of degaussing, but degaussing machine magnetic wave high, a large number of degaussing commissioned by specialized companies more quickly and safely.
Method 3: Mashing/shearing method
Breaking an entity's storage media so that data cannot be read by the system is also a way to ensure data confidentiality and security.
Justice, chuan-his Chen pointed out that justice most of the data for the former case, the criminal record record data, belongs to the permanent file, are more likely to encounter in the system transfer data disposal, in addition to low-level formatting disks, tapes, more with the method of entity dolly, let data storage media, people use cannot be read.
In addition, a telecommunications company will also store the data of the disc, the large machine smashed, ground up action.
Although some have questioned the safety of using this method of data destruction, companies that use this method of data destruction, in addition to measuring the maximum risk they can take, have the added benefit of using incineration.
Method 4: Incineration
Almost every storage medium that needs to be replaced will eventually have to be incinerated so that the data is literally incinerated and no longer exists.
By burning the storage media of the telecommunication company, the purpose of data confidentiality is achieved;
Taiwan Life also USES incineration to end tapes that are reused and must be replaced, according to Zhang Qingtong, associate director of its computer center. In this process, information supervisors are required to be on the spot to monitor the status and progress of the incineration of old data and to implement the last step of data preservation.