Review Which of the following is the most reliable method of destroying data on a solid state drive SSD )?
Kinh Nghiệm Hướng dẫn Which of the following is the most reliable method of destroying data on a solid state drive SSD )? Chi Tiết
Cao Ngọc đang tìm kiếm từ khóa Which of the following is the most reliable method of destroying data on a solid state drive SSD )? được Cập Nhật vào lúc : 2022-08-26 11:38:03 . Với phương châm chia sẻ Bí quyết Hướng dẫn trong nội dung bài viết một cách Chi Tiết 2022. Nếu sau khi đọc nội dung bài viết vẫn ko hiểu thì hoàn toàn có thể lại phản hồi ở cuối bài để Mình lý giải và hướng dẫn lại nha. hi there,
Advice from expert CISSP confused with this Q.
- Which of the following is the most sensitive classification of data?Which of the following forms of clearing prepares truyền thông for reuse in a less secure environment?What is the most important aspect of marking truyền thông?When determining the classification of data which one of the following is the most important consideration Chapter 5?
7. Which of the following choices is the most reliable method of destroying data on a solid state drive?
A. Erasing
B. Degaussing
C. Deleting
D. Purging
Ans - D. Purging.
Tanks....
Hudda
Comments
logikil Member Posts: 26 ■□□□□□□□□□
So are you trying to identify why D is the answer? Its all down to wording and the options presented. If destruction were there I would go with destruction, but based on what is and the definitions of the different processes, purging would be best because it is defined as:
Making information unrecoverable even with extraordinary effort such as a physical forensics lab.
Because that definition doesn't necessarily provide a specific mechanism it would be whatever means fits that bill. Degaussing doesn't help with SSD, deleting doesn't really get rid of the data just to pointers to it, and erasing may be a single 0 pass over the data, but potentially offers the ability to recover. So for this question should be D.
LonerVamp OSCP, GCFA, GWAPT, CISSP, OSWP, AWS SA-A, AWS Security, Sec+, Linux+, CCNA Cyber Ops, CCSK Member Posts: 518 ■■■■■■■■□□
Good question, since so many CISSP questions rely on the details of every single word. In this case, solid state drives are not affected by degaussing, so that one gets thrown out, leaving purging. (Degaussing is a form of purging.)
Security Engineer/Analyst/Geek, Red & Blue Teams
OSCP, GCFA, GWAPT, CISSP, OSWP, AWS
SA-A, AWS Security, Sec+, Linux+, CCNA Cyber Ops, CCSK
2022 goals: maybe AWAE or SLAE, bunch o' courses and red team labs?
PJ_Sneakers CompTIA, EC-Council, ISACA, Microsoft USAMember Posts: 884 ■■■■■■□□□□
A) Erasing - Not sure this is even a "real" term. Could be like deleting? See answer C.
C) Deleting - Doesn't destroy data.
D) Purging - The only term that isn't ruled out above, that does in fact refer to the destruction of data. Also used as a term by NIST in reference to data sanitization.
I thought B is the answer but just read that degaussing does not apply to SSDs.
So with that knowledge, I would say erase means delete which both mean data can be recovered. B does not apply so purge has more of a punch than A and C
dhay13 Member Posts: 580 ■■■□□□□□□□
As said above, purge, since destruction isn't an option.
You guys are the best of the best !
kabooter you are correct I read also degaussing does not apply to SSDs.
Thanks
Hudda
A few months ago, we were approached by one of our customers to help them develop a solution with us to securely destroy their solid-state drives that have failed or have been decommissioned. We accepted the challenge and here’s what we found out about the destruction of solid-state drives:
1. Degaussing won’t work. A solid-state drive uses integrated circuit assemblies to store data, unlike traditional hard disk drives. The data on SSDs is virtually unaffected by the method of degaussing. Although degaussing is the absolute best practice for traditional hard drives, it erases data by reducing or eliminating the unwanted magnetic field (information). Because SSDs do not store data magnetically, they are not able to be securely destroyed via traditional methods.
2. Shred particle size is critical. The best practice to destroy a solid-state drive is via hard drive shredding. After a few tests with our client, we discovered that the shred width (particle size) was critical to the success of destroying the small memory chips where the data is stored. Typically, a shred width of ½” or smaller is needed to break through the small memory chips and securely obliterate the data. Many standard industrial shredders will shred to 1” particle size, thus allowing the memory chips to slip through the hammers that shred the data, leaving sensitive information intact. When destroying SSDs, awareness of the appropriate shred width distinction to break through the memory chips is crucial.
3. Trackable inventory is necessary. From cradle to grave, management of IT assets requires a leak-proof system that accounts for the location and status of each asset. With an auditable, trackable, and indisputable inventory record of each destroyed SSD, liability and risk are greatly minimized. If you have sensitive data, assurance that it is gone for good with the correct documentation is not only peace of mind, but can also save you from damages in the sự kiện of a breach.
The modernity of this technology has sparked the need for innovation in responsible and secure disposal for SSDs. Knowledge of the best practices when it comes to the last 100 yards of an IT asset’s end-of-life is essential to managing risk. With solid-state drives, always make sure your in-house solution or current vendor is utilizing the correct shredder to guarantee physical destruction of the data. The emergence of solid-state drives is why Securis has invested in the necessary technology to dispose of them properly.
Post a Comment