W dniu 2012-12-13 06:19, Stephen Mednick pisze:
I think what is being overlooked in this discussion is what is the
corporate policy regarding the erasing of disk media.

Unfortunately most of "corporate policies" has very little to do with common sense or physics. As I heard "this is matter of security, so don't look for any logic here!".

In planning to erase disk media it's important to seek the advice of
the corporate IT Security advisor or IT auditor and get sign-off as
to what is the approved methodology for erasing disk media.

For a government entity there is more than likely to be a much more
stringent requirement than a straight forward ICKDSF volume erase.

1. ICKDSF (and general tools operating from MVS level) can be ONE OF USED METHODS. Reformatting array, special "erase data" features can be another one.

2. You assumed the array will be disposed (sold) after the erasuer. It may be the case, but doesn't have to be. Another possibility is to delete production files before the array is used for tests. There are many scenarios where data should be deleted (erased), but the array is not leaving server room.


When we talk about very secure erasing methods then we should care about information security at all. What I mean: * Recovering your data from bad sectors is ineffective. You MAYBE would get some chunks, few puzzles of 1000000 set. Interesting or not. You will go easier way. The weakest link. * You can get complete data as forgotten copy or backup. There are plenty of copies, unfortunately not each of them is as well protected as the original. * You can download the data, because you have READ access. Data on your PC are as interesting as the source resinding on very secure dasd array in secure server room. Your PC can be synchronized with your laptop, the laptop can be used in home, stolen, virus affected...
* Bribery, blackmail. Very effective way to get interesting data.

The weakest key. Properly erased array is not as attracive as ay of the above. There is no real reason to strengthen the strong link.

--
Radoslaw Skorupka
Lodz, Poland






--
Treść tej wiadomości może zawierać informacje prawnie chronione Banku 
przeznaczone wyłącznie do użytku służbowego adresata. Odbiorcą może być jedynie 
jej adresat z wyłączeniem dostępu osób trzecich. Jeżeli nie jesteś adresatem 
niniejszej wiadomości lub pracownikiem upoważnionym do jej przekazania 
adresatowi, informujemy, że jej rozpowszechnianie, kopiowanie, rozprowadzanie 
lub inne działanie o podobnym charakterze jest prawnie zabronione i może być 
karalne. Jeżeli otrzymałeś tę wiadomość omyłkowo, prosimy niezwłocznie 
zawiadomić nadawcę wysyłając odpowiedź oraz trwale usunąć tę wiadomość 
włączając w to wszelkie jej kopie wydrukowane lub zapisane na dysku.

This e-mail may contain legally privileged information of the Bank and is intended solely for business use of the addressee. This e-mail may only be received by the addressee and may not be disclosed to any third parties. If you are not the intended addressee of this e-mail or the employee authorised to forward it to the addressee, be advised that any dissemination, copying, distribution or any other similar activity is legally prohibited and may be punishable. If you received this e-mail by mistake please advise the sender immediately by using the reply facility in your e-mail software and delete permanently this e-mail including any copies of it either printed or saved to hard drive.
BRE Bank SA, 00-950 Warszawa, ul. Senatorska 18, tel. +48 (22) 829 00 00, fax 
+48 (22) 829 00 33, www.brebank.pl, e-mail: [email protected]
Sąd Rejonowy dla m. st. Warszawy XII Wydział Gospodarczy Krajowego Rejestru Sądowego, nr rejestru przedsiębiorców KRS 0000025237, NIP: 526-021-50-88. Według stanu na dzień 01.01.2012 r. kapitał zakładowy BRE Banku SA (w całości wpłacony) wynosi 168.410.984 złotych.


----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to