The 2009 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market

@article{Jones2006The2A,
  title={The 2009 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market},
  author={Andrew Jones and Craig Valli and Glenn S. Dardick and Iain Sutherland and Gogobada Daa Dabibi and Gareth Davies},
  journal={J. Digit. Forensics Secur. Law},
  year={2006},
  volume={5},
  pages={43-64}
}
All organisations, whether in the public or private sector, increasingly use computers and other devices that contain computer hard disks for the storage and processing of information relating to their business, their employees or their customers. Individual home users also increasingly use computers and other devices containing computer hard disks for the storage and processing of information relating to their private, personal affairs. It continues to be clear that the majority of… 

Tables from this paper

The 2012 Analysis of Information Remaining on Computer Hard Disks Offered for Sale on the Second Hand Market in the UAE

This research describes the first survey of data remaining on computer hard disks sold on the second hand market in the United Arab Emirates (UAE), undertaken to gain insight into the volumes of data found on disks purchased in the UAE compared to other regions of the world and to gain an understanding of the relative level of the problem of residual data in the Emirates.

Analysis of Information Remaining on Hand Held Devices Offered for Sale on the Second Hand Market

The research revealed that a significant number of organisations and private users are ignorant or misinformed about the volume and type of information that is stored on the hand held devices and the media on which it is stored.

Zombie Hard Disks - Data from the Living Dead

Analysis of non-functioning disks supplied to the University of Glamorgan is details the ease with which data can be recovered from these drives using specialist recovery tools, and discusses implications for both computer forensics and information security practices and procedures.

The 2009 analysis of information remaining on USB storage devices offered for sale on the second hand market

The purpose of the research has been to gain an understanding of the information that remains on the USB storage devices and to determine the level of damage that could, potentially, be caused if that information fell into the wrong hands.

Who is Reading the Data on Your Old Computer?

  • V. Mee
  • Computer Science
    J. Digit. Forensics Secur. Law
  • 2008
Researchers at Rits Information Security performed a study in how the Irish population disposes of their old computers, finding that careless disposal of computers and storage media in the Republic of Ireland is a significant problem.

Forensics Analysis of Corporate and Personal Information Remaining on Hard Disk Drives Sold on the Secondhand Market in Indonesia

This research paper aimed to analyze using digital forensics techniques the information that remains on computer hard disks offered for sale on the second hand market in Indonesia to find sensitive personal and confidential corporate information.

An empirical methodology derived from the analysis of information remaining on second hand hard disks

In this paper we present the findings of an analysis of approximately 260 second hand disks that was conducted in 2006. A third party organisation bought the disks from the second hand market

An Evaluation of Personal Health Information Remnants in Second-Hand Personal Computer Disk Drives

There is a strong need for health care data custodians to either encrypt all computers that can hold PHI on their clients or patients, including those used by employees and subcontractors in their homes, or to ensure that their computers are destroyed rather than finding a second life in the used computer market.

Hard-drive Disposal and Identity Fraud

Whether it is possible for identity fraud to occur as a result of post-disposal access to the residual data stored on a personal computer’s hard drive is investigated.

Is your data gone?: measuring user perceptions of deletion

There is no statistically significant difference between buyback and market drives in terms of deletion methods nor presence of sensitive data, and thus the security community may need to take a different approach to increase the usability, availability, and/or necessity of strong deletion methods.

References

SHOWING 1-10 OF 73 REFERENCES

Throwing out the Enterprise with the Hard Disk

  • C. Valli
  • Computer Science
    Australian Computer, Network & Information Forensics Conference
  • 2004
The results from this study indicate careless disposal of data devices is widespread, and the ability to recover information from hard drives that are for sale at public auctions in Australia is limited.

Data Remanence in Semiconductor Devices

This work extends the brief coverage of this area given in the earlier paper by providing the technical background information necessary to understand remanence issues in semiconductor devices.

Secure deletion of data from magnetic and solid-state memory

This paper covers some of the methods available to recover erased data and presents schemes to make this recovery significantly more difficult.

Remembrance of Data Passed: A Study of Disk Sanitization Practices

Many discarded hard drives contain information that is both confidential and recoverable, as the authors' own experiment shows. The availability of this information is little publicized, but

Oops ! Firm accidentally eBays customer database , The Register , 07 June 2004

  • 2004

UK's families put on fraud alert

  • BBC

Disk Slipped Into Wrong Hands

  • Canadian Globe and Mail

Oops! Firm accidentally eBays customer database, The Register

    He has over 30 publications to his name on security related topics. His research interests include Network Security, Honeypots, Intrusion Detection Systems

    • He has over 30 publications to his name on security related topics. His research interests include Network Security, Honeypots, Intrusion Detection Systems

    ) 14 PGP Corporation

      ...