Page 27 - index
P. 27
Getting back to this hygiene idea, a powerful data wiping utility with enhanced tools is like
using dental floss and mouthwash alongside your toothbrush and toothpaste. While using
just some of these things will cover the basics, the extra tools will be that much more
effective. When removing data from your computer, wiping software can be used in
conjunction with encryption software to more thoroughly protect your data. With encryption,
you can completely protect your swap file. Windows-based systems use a swap file for
virtual memory support - helping to manage system memory while you're working at your
laptop or PC. While working on your files, Windows will take files or documents (even those
that have been encrypted) and copy all or part of them to an open unencrypted 'swap. ‘
Encrypting the swap file will preserve the integrity of data, further preventing any
unauthorized access to private information.
2. Perform wiping tasks properly
When you visit a dental hygienist, you'll get tips on how to brush your teeth properly... "Use
short strokes, back-and-forth and up-and-down"... "Pay attention to your gum line"... "Clean
the inner and outer surfaces of your teeth"... and so on. Much like these tips on dental
hygiene, here are some ‘cyber hygiene’ steps to make sure you cover all bases and
completely wipe your data for a clean system (NOTE: Don’t worry if this sounds too
complicated – take comfort that with a good wiping utility, all this dirty work is managed with
a simple click or checking a box.):
Encrypt and protect your system swap file before wiping.
Disable System Restore before wiping to avoid shadow copies.
Empty your Recycle Bin before wiping to make sure everything is cleared out.
Wipe any free space areas where deleted data is stored until overwritten by new
information.
Choose an appropriate wiping scheme so that you know exactly how many times
the disk will be overwritten and which wiping patterns will be used.
Wipe slack space of existing files. Cleaning these slack spaces is just like
flossing your teeth. Old data can be stored here, but an effective wiping utility
should clean these areas for maximum ‘cyber hygiene’.
Wipe MFT records to wipe names of deleted files.
Clear the user Temp folders routinely to make sure that names of recently used
files are cleared and any traces of Internet activity (Internet History and Local
History) are removed from the system.
27 Cyber Warnings E-Magazine – October 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide