Method Description. Disposal Disposal is the act of discarding media with no other sanitization considerations. This is most often done by paper recycling containing non-confidential information but may also include other media. Clearing Clearing information is a level of media sanitization that would protect the confidentiality of information against a robust keyboard attack. Simple deletion of items would not suffice for clearing. Clearing must not allow information to be retrieved by data, disk, or file recovery utilities. It must be resistant to keystroke recovery attempts executed from standard input devices and from data scavenging tools. For example, overwriting is an acceptable method for clearing media. The security goal of the overwriting process is to replace written data with random data. Overwriting cannot be used for media that are damaged or not writeable. The media type and size may also influence whether overwriting is a suitable sanitization method. Purging Purging information is a media sanitization process that protects the confidentiality of information against a laboratory attack. For some media, clearing media would not suffice for purging. However, for ATA disk drives manufactured after 2001 (over 15 GB) the terms clearing and purging have converged. Destroying Destruction of media is the ultimate form of sanitization. After media are destroyed, they cannot be reused as originally intended. Physical destruction can be accomplished using a variety of methods, including disintegration, incineration, pulverizing, shredding, and melting. • Disintegration, Incineration, Pulverization, and Melting. These sanitization methods are designed to completely destroy the media. • Shredding. Paper shredders can be used to destroy flexible media such as diskettes once the media are physically removed from their outer containers. The shred size of the refuse should be small enough that there is reasonable assurance in proportion to the data confidentiality level that the information cannot be reconstructed. Optical mass storage media, including compact disks (CD, CD-RW, CD-R, CD-ROM), optical disks (DVD), and magneto-optic (MO) disks must be destroyed by pulverizing, crosscut shredding or burning. Destruction of media should be conducted only by trained and authorized personnel. Safety, hazmat, and special disposition needs should be identified and addressed prior to conducting any media destruction. Paper and microforms [**] [**] [**] Cell Phones [**] [**] [**] Personal Digital Assistant (PDA) [**] [**] [**] Routers [**] [**] [**] Copy Machines [**] [**] [**] Fax Machines [**] [**] [**] Reel and Cassette Format Magnetic Tapes [**] [**] [**] CDs [**] [**] [**] DVDs [**] [**] [**] Compact Flash Drives, SD [**] [**] [**] Dynamic Random Access Memory (DRAM) [**] [**] [**] Electronically Alterable PROM (EAPROM) [**] [**] [**] Electronically Erasable PROM (EEPROM) [**] [**] [**] Erasable Programmable ROM (EPROM) [**] [**] [**] Field Programmable Gate Array (FPGA) Devices (Non-Volatile) [**] [**] [**] Field Programmable Gate Array (FPGA) Devices (Volatile) [**] [**] [**] Flash Cards [**] [**] [**] Flash Cards (FEPROM) [**] [**] [**] Magnetic Bubble Memory [**] [**] [**] Magnetic Core Memory [**] [**] [**] Non Volatile RAM (NOVRAM) [**] [**] [**] PC Cards or Personal Computer Memory Card International Association (PCMCIA) Cards [**] [**] [**] Programmable ROM (PROM) [**] [**] [**] RAM [**] [**] [**] ROM [**] [**] [**] USB Removable Media (Pen Drives, Thumb Drives, Flash Drives, Memory Sticks) without Hard Drives [**] [**] [**] Smart Cards [**] [**] [**] Magnetic Cards [**] [**] [**] The purpose of this standard is to establish authentication requirements for verification of user identity and associated access privileges.
Appears in 1 contract
Method Description. Disposal Disposal is the act of discarding media with no other sanitization considerations. This is most often done by paper recycling containing non-confidential information but may also include other media. Clearing Clearing information is a level of media sanitization that would protect the confidentiality of information against a robust keyboard attack. Simple deletion of items would not suffice for clearing. Clearing must not allow information to be retrieved by data, disk, or file recovery utilities. It must be resistant to keystroke recovery attempts executed from standard input devices and from data scavenging tools. For example, overwriting is an acceptable method for clearing media. The security goal of the overwriting process is to replace written data with random data. Overwriting cannot be used for media that are damaged or not writeable. The media type and size may also influence whether overwriting is a suitable sanitization method. Purging Purging information is a media sanitization process that protects the confidentiality of information against a laboratory attack. For some media, clearing media would not suffice for purging. However, for ATA disk drives manufactured after 2001 (over 15 GB) the terms clearing and purging have converged. Destroying Destruction of media is the ultimate form of sanitization. After media are destroyed, they cannot be reused as originally intended. Physical destruction can be accomplished using a variety of methods, including disintegration, incineration, pulverizing, shredding, and melting. • · Disintegration, Incineration, Pulverization, and Melting. These sanitization methods are designed to completely destroy the media. • · Shredding. Paper shredders can be used to destroy flexible media such as diskettes once the media are physically removed from their outer containers. The shred size of the refuse should be small enough that there is reasonable assurance in proportion to the data confidentiality level that the information cannot be reconstructed. Optical mass storage media, including compact disks (CD, CD-RW, CD-R, CD-ROM), optical disks (DVD), and magneto-optic (MO) disks must be destroyed by pulverizing, crosscut shredding or burning. Destruction of media should be conducted only by trained and authorized personnel. Safety, hazmat, and special disposition needs should be identified and addressed prior to conducting any media destruction. Paper and microforms [**] [**] · [**] Cell Phones [**] [**] · [**] Personal Digital Assistant (PDA) [**] [**] · [**] Routers [**] [**] · [**] Copy Machines [**] [**] · [**] Fax Machines [**] [**] · [**] Reel and Cassette Format Magnetic Tapes [**] [**] · [**] CDs [**] [**] [**] DVDs [**] [**] [**] Compact Flash Drives, SD [**] [**] [**] Dynamic Random Access Memory (DRAM) [**] [**] · [**] Electronically Alterable PROM (EAPROM) [**] [**] · [**] Electronically Erasable PROM (EEPROM) [**] [**] [**] Erasable Programmable ROM (EPROM) [**] [**] · [**] Field Programmable Gate Array (FPGA) Devices (Non-Volatile) [**] [**] [**] Field Programmable Gate Array (FPGA) Devices (Volatile) [**] [**] [**] Flash Cards [**] [**] [**] Flash Cards (FEPROM) [**] [**] · [**] Magnetic Bubble Memory [**] [**] [**] Magnetic Core Memory [**] · [**] [**] Non Volatile RAM (NOVRAM) [**] [**] [**] PC Cards or Personal Computer Memory Card International Association (PCMCIA) Cards [**] [**] [**] Programmable ROM (PROM) [**] [**] [**] RAM [**] [**] [**] ROM [**] [**] [**] USB Removable Media (Pen Drives, Thumb Drives, Flash Drives, Memory Sticks) without Hard Drives [**] [**] [**] Smart Cards [**] [**] [**] Magnetic Cards [**] [**] · [**] The purpose of this standard is to establish authentication requirements for verification of user identity and associated access privileges.
Appears in 1 contract