FXXX: Unterschied zwischen den Versionen
Etduen (Diskussion | Beiträge) (Die Seite wurde neu angelegt: „Bachelor Thesis, Hochschule Wismar, August 2022 Autor: FXXX Titel: '''Presentation and evaluation of common methods of deleting user data in common computer…“) |
Etduen (Diskussion | Beiträge) Keine Bearbeitungszusammenfassung |
||
Zeile 8: | Zeile 8: | ||
In the paper to be worked on here, selected deletion processes in typical workflows of common electronic data processing systems such as PCs and laptops are to be analysed and compared. Specifically, this involves the deletion of general data and special information in file systems, on common data carriers, in data structures (tables, arrays, lists, etc.) and in distributed cloud storage. | In the paper to be worked on here, selected deletion processes in typical workflows of common electronic data processing systems such as PCs and laptops are to be analysed and compared. Specifically, this involves the deletion of general data and special information in file systems, on common data carriers, in data structures (tables, arrays, lists, etc.) and in distributed cloud storage. | ||
The analytical considerations and definitions of terms are carried out from the viewpoint of a private user, a company and a public authority under the respective subjective specifications. | The analytical considerations and definitions of terms are carried out from the viewpoint of a private user, a company and a public authority under the respective subjective specifications. | ||
Individual legal requirements and significant internationally recognized standards relating to the secure deletion of data will also be included in the considerations and evaluations. Legal, operational and personal requirements will thus be linked to the technical deletion processes. In doing so, the described conventional deletion processes will be compared with the individually applicable specifications. | Individual legal requirements and significant internationally recognized standards relating to the secure deletion of data will also be included in the considerations and evaluations. Legal, operational and personal requirements will thus be linked to the technical deletion processes. In doing so, the described conventional deletion processes will be compared with the individually applicable specifications. | ||
The presentation of the different physical deletion processes on commercially available data carriers is only exemplary and generally understandable. | The presentation of the different physical deletion processes on commercially available data carriers is only exemplary and generally understandable. | ||
In this respect, current malware and sabotage malware are to be used to illustrate the real application of erasure processes as a concrete danger. Furthermore, technical data deletion processes in general with regard to hardware and software and their practical implementation possibilities for common users will be demonstrated. Selected software solutions for secure erasure and individual (firmware) tools from well-known manufacturers of data media will be presented as examples. | In this respect, current malware and sabotage malware are to be used to illustrate the real application of erasure processes as a concrete danger. Furthermore, technical data deletion processes in general with regard to hardware and software and their practical implementation possibilities for common users will be demonstrated. Selected software solutions for secure erasure and individual (firmware) tools from well-known manufacturers of data media will be presented as examples. | ||
The final evaluation of the presented erasure methods will be done from the point of view of actual applicability, individual security needs, legal aspects and technical conditions. | The final evaluation of the presented erasure methods will be done from the point of view of actual applicability, individual security needs, legal aspects and technical conditions. |
Version vom 29. August 2022, 14:57 Uhr
Bachelor Thesis, Hochschule Wismar, August 2022
Autor: FXXX
Titel: Presentation and evaluation of common methods of deleting user data in common computer file systems
Abstract
In the paper to be worked on here, selected deletion processes in typical workflows of common electronic data processing systems such as PCs and laptops are to be analysed and compared. Specifically, this involves the deletion of general data and special information in file systems, on common data carriers, in data structures (tables, arrays, lists, etc.) and in distributed cloud storage.
The analytical considerations and definitions of terms are carried out from the viewpoint of a private user, a company and a public authority under the respective subjective specifications.
Individual legal requirements and significant internationally recognized standards relating to the secure deletion of data will also be included in the considerations and evaluations. Legal, operational and personal requirements will thus be linked to the technical deletion processes. In doing so, the described conventional deletion processes will be compared with the individually applicable specifications.
The presentation of the different physical deletion processes on commercially available data carriers is only exemplary and generally understandable.
In this respect, current malware and sabotage malware are to be used to illustrate the real application of erasure processes as a concrete danger. Furthermore, technical data deletion processes in general with regard to hardware and software and their practical implementation possibilities for common users will be demonstrated. Selected software solutions for secure erasure and individual (firmware) tools from well-known manufacturers of data media will be presented as examples. The final evaluation of the presented erasure methods will be done from the point of view of actual applicability, individual security needs, legal aspects and technical conditions. Finally, the described erasure methods will be presented in a table with regard to selected criteria such as performance, applicability, security, costs, etc. under the overriding objective of suitability for private users, companies or public authorities.