When cryptography meets storage
Proceedings of the 4th ACM international workshop on Storage security and survivability
A survey of confidential data storage and deletion methods
ACM Computing Surveys (CSUR)
Hi-index | 0.00 |
Data security is obviously becoming more important for anyone involved computer security. Encryption methods have become more advanced over the years, and there are plenty of tools available that can prevent intruders from accessing confidential data on an active network. However, one of the easiest methods for would-be attackers to gather confidential information is by recovering data from discarded computer hardware or other storage media. This paper covers security concerns related to end of life computer equipment and methods for properly destroying information so it cannot be recovered.