🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Chapter 15 - 03 - Discuss Data Backup, Retention, and Destruction - 10_ocred_fax_ocred.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

Certified Cybersecurity Technician Exam 212-82 Data Security Data Destruction Tools...

Certified Cybersecurity Technician Exam 212-82 Data Security Data Destruction Tools ° Disk Wipe: Windows Diskpart Utility DBAN Q DiskPart is a command utility to manage drives, partitions, and volumes https://dban.org Q 1t quickly removes data and partitions from a hard drive using the command prompt 00O Active@ KillDisk https://www.killdisk.com Eraser https://eraser.heidi.ie PC Shredder http://www.pcshredder.com ©O0 Macrorit Data Wiper https://macrorit.com Copyright © by EC€ cil.L Al ANl Rights Reserved. Reproduction Is Strictly Prohibited Data Destruction Tools = Windows DiskPart Utility o DiskPart is a command utility to manage drives, partitions, and volumes. o It can be used when other tools such as Disk Management and Format are unable to resolve the problem. oo] It quickly removes data and partitions from a hard drive using the command prompt. Steps to Wipe a Hard Drive with Windows DiskPart o Open command prompt in Administrator Mode. O Type diskpart and press Enter to launch Diskpart. o Type list disk for listing all drives connected to the computer, and press Enter. Type select disk 1 for selecting the drive the user wants to clean, and press Enter. Type clean to wipe out the drive and press Enter. Module 15 Page 1905 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Data Security Microsoft Windows ¥ ws [V on 10.0.18362.207) (c) 2019 Microsoft C ration. All rights reserved. C: \Windows\system323idiskpart IC: \Windows\system323idiskpart Microsoft DiskPart version 10.0.18362.1 rosoft Corporation. Copyright (C) Microsoft puter: VM-W10-1993 Dyn Gpt the selected disk. DISKPART> > DISKPART clean DiskPart succeeded in cleaning the disk. Figure 15.98: Wiping a hard drive with Windows DiskPart o Type list disk for confirming the selected drive and press Enter. o Type create partition primary command for creating aa new partition on the drive and press Enter. o Type select partition 11 command for selecting the new primary partition and press Enter. o Type active for activating the selected partition and press Enter. PARTH create partition primary t succeeded in creating the specifie specified partition. MISKPART> DISKPARTY select partition 1 Partition 1 is noww the the selected partition, e current partition as active, tive, Figure 15.99: Selected partition activation o Type format FS=NTFS label=Data quick for formatting the partition and setting a drive label, and press Enter. o Type assign letter=w command to assign a letter and make the drive available in File Explorer, then press Enter. Module 15 Page 1906 Certified Cybersecurity Technician Copyright © by EG-Gouncil EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Data Security trator DISKPART>| format FS«NTFS labele«Data quick 100 percent completed DiskPart successfully formatted the volume. DISKPARTY assign lettersw DiskPart successfully assigned the drive letter or mount point, DISKPART> exit Leaving DiskPart,.. C:\Windows\system32> Figure 15.100: Formatting the partition and making the drive available in File Explorer o Type exit command for terminating DiskPart, and press Enter. Some additional data destruction tools are as follows: = DBAN (https://dban.org) » Active@ KillDisk (https.//www.killdisk.com) » Eraser (https://eraser.heidi.ie) » PC Shredder (http://www.pcshredder.com) *= Macrorit Data Wiper (https://macrorit.com) Module 15 Page 1907 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Data Security Data Destruction Best Practices )o i ee e ) Monitor destruction ¢ 5 ?;f:;eu Iz;nd follow a data retention o% [fl TS FallowcomEi N ( /4 5 ::2::;: and document a destruction @ T (4 Copyright © by EC-Councll. All Rights Reserved. Reproduction Is Strictly Prohibited Data Destruction Best Practices 1. Define and document a policy for destruction and retention of data: The policy for retaining data will be based on the record retention schedule. Upon completion of the retention period, the data should be destroyed. Define and follow a data retention schedule: A data retention schedule sets the guidelines on how long the data should remain accessible for future use or reference, and destructs the data when not in use. Prepare and document a destruction process: Accessibility to the confidential information of an organization poses a serious threat; thus, the organization should safeguard its confidential information, recognize the security loopholes, and take measures to avoid them. Best practices in document destruction are divided into three key guidelines for securing customer, employee, and business information, as follows: o Shred all and shred regularly. o Shred before recycling. o Shred using a professional service. Monitor destruction: Depending on the growth and evolution of the organization, the destruction needs will change. Hence, monitor the destruction process to meet the current and future needs. Follow compliance: The company should be in compliance with the laws and regulations pertaining to classified equipment destruction. If there are policies pertaining to the destruction of classified equipment, then they should be complied with. Disposition of Module 15 Page 1908 Certified Cybersecurity Technician Copyright © by EG-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Data Security classified equipment requires ethical and legal obligations; therefore, if a company does not dispose equipment properly, they may have to face a number of legal issues. 6. Recycle the e-waste: e-waste recycling prevents the reuse or recovery of sensitive information from corporate computers and devices. The proper recycling of e-waste keeps the environment safe. Module 15 Page 1909 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Data Security Data Recovery Tools EaseUS Data EaseUS data recovery software can quickly retrieve lost files after deletion Recovery Wizard Wizard or emptying the recycle bin Select a location to start recovering o Recuva® https://www.ccleaner.com ® Devices and Drives (12) C Puran File Recovery Lowad Lol Dt (€) (C) Lexad Loxad Dt Dut (0) () Novwr Viiamme (1) Locad Db Dub 1G) http://www.purensoftware.com http://www.puronsoftwore.com —_— -— L I LI © Glary Undelete https://www.glarysoft.com https://www.glarysoft.com £ 1 i [ z - f2 i Specity Specityaa location L Ll Omatee Omate L) Reopie tin B setmet et fotter ® SoftPerfect File Recovery https://www.softperfect.com Wise Data Recovery https://i ps:/ com https://www.wisecleaner.com https//www.easeus. com https//www.eoseus.com Data Recovery Tools = EaseUS Data Recovery Wizard Source: https://www.easeus.com EaseUS data recovery software can quickly retrieve lost files after deletion or emptying the recycle bin. It scans for all recoverable files from any inaccessible storage device and completes file recovery safely and efficiently. It is used not only for the recovery of deleted files and formatted drives, but also for overcoming other data-loss issues such as virus attacks, human errors, power failures, system crashes, OS re- installation/upgrade, hard-drive crashes, and software crashes. Module 15 Page 1910 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Data Security ) EaseUS Data Recovery Wizard (D Can't find location Select a location to start recovering Devices and Drives (12) C Local Disk (C:) Local Disk (D:) New Volume (E:) Local Disk (G:) -— — O |—ci ——ci SS = [1 ] 32,68 GB / 108,90 GB 3268 11,64 GB / 110.16 GB 11.64 233 GB /235 GB 38,88 GB / 39.56 GB Local Disk (H:) Local Disk (I:) Local Disk (J):) (J:) System Reser... (K:) MDD o [swsaaes| omm—— === a 28,67 GB / 29.02 GB 13.21 GB / 23.75 GB 501.04 M8 501,04 MB // 917.88 917.88 M8 M8 515.52 MB / 549.00 MB Specify a location Desktop Recycle Bin r—_ Select Folder Figure 15.101: Screenshot of EaseUS Data Recovery Wizard Some additional data recovery tools are as follows: Recuva® (https://www.ccleaner.com) Puran File Recovery (http://www.puransoftware.com) Glary Undelete (https.//www.glarysoft.com) SoftPerfect File Recovery (https://www.softperfect.com) Wise Data Recovery (https://www.wisecleaner.com) Module 15 Page 1911 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited.

Use Quizgecko on...
Browser
Browser