U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Data Dilemma

NCJ Number
153550
Journal
Security Management Volume: 39 Issue: 2 Dated: (February 1995) Pages: 29,30,32
Author(s)
C M Preston
Date Published
1995
Length
3 pages
Annotation
Security managers must determine appropriate methods of destruction of computer data, because data stored on magnetic disks and tapes is hard to destroy permanently and well-known systems of erasure and destruction may be effective against only unskilled or inexperienced searchers.
Abstract
Files deleted from a computer are not really gone; they are often easy and inexpensive to recover. Even seemingly effective methods of erasure or destruction (overwriting the file, formatting the disk, degaussing and cutting up the disk) may not completely expunge data. Information protection methods that can frustrate a local competitor may fail against international attackers with larger budgets with larger budgets and more sophisticated operations. Possible approaches to reducing the vulnerability of data include the encryption of sensitive files, frequent overwriting of files, avoidance of virtual memory, precautions when traveling, and establishment of definite procedures for the disposal and repair of magnetic media and computers.