![]() ![]() It proceeds with 3 runs (DoD 5220.22-M E): data is first overwritten with a fixed value, then with the complement of that value, and finally with a random value. The method is based on the "National Industrial Security Program Operating Manual“, NISPOM (US DoD 5220.22-M) the DoD from January 1995. This procedure is completed with new random values three times. Data is overwritten with a random value and then with this values complement. This method for medium security conforms to the standards of the German BSI as described in the “BSI IT Baseline Protection Manual”. In this seven cycle variation (DoD 5220.22-M ECE), data is first overwritten three times with DoD 5220.22-M (E) Standards, then with a specific random value, and finally once again with DoD 5220.22-M (E). The method for high security is based on the January 1995 'National Industrial Security Program Operating Manual' by the DoD. In this method, deleted data is overwritten by a series of 35 different deletion cycles that are executed in a random order. The method that offers the highest level of security is based on a process developed by Peter Gutmann and presented in his article “Secure Deletion of Data from Magnetic and Solid-State Memory”. This indicator basically serves to illustrate the differences in time needed for deletion according to the volume of data and the deletion method selected. The actual amount of time needed for deletion can vary significantly, depending on the system’s capacity and condition of the hardware. The display of time remaining is only an approximation. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |