SlideShare a Scribd company logo
1 of 1
Confidential data storage and deletion
With the decrease in cost of electronic storage media, more and more sensitive data gets stored in
those media. Laptop computers regularly go missing, either because they are lost or because they are
stolen. These laptops contain confidential information, in the form of documents, presentations,
emails, cached data, and network access credentials. This confidential information is typically far more
valuable than the laptop hardware, if it reaches right people. There are two major aspects to
safeguard the privacy of data on these storage media/laptops. First, data must be stored in a
confidential manner. Second, we must make sure that confidential data once deleted can no longer be
restored. Various methods exist to store confidential data such as encryption programs, encryption file
system etc. Microsoft BitLocker Drive Encryption provides encryption for hard disk volume and is
available with Windows Vista Ultimate and Enterprise editions.
This seminar describes the most commonly used encryption algorithm, Advanced Encryption System
(AES) which is used for many of the confidential data storage methods. This seminar also describes
some of the confidential data erasure methods such as physical destruction, data overwriting methods
and Key erasure.

More Related Content

What's hot

Trying to bottle the cloud forensic challenges with cloud computing
Trying to bottle the cloud   forensic challenges with cloud computingTrying to bottle the cloud   forensic challenges with cloud computing
Trying to bottle the cloud forensic challenges with cloud computingBrent Muir
 
online game over cryptography
online game over cryptographyonline game over cryptography
online game over cryptographyAshish Kumar
 
a hybrid cloud approach for secure authorized reduplications
a hybrid cloud approach for secure authorized reduplicationsa hybrid cloud approach for secure authorized reduplications
a hybrid cloud approach for secure authorized reduplicationsswathi78
 
CORA - Quantum Safe Cryptography
CORA - Quantum Safe CryptographyCORA - Quantum Safe Cryptography
CORA - Quantum Safe CryptographyJoseph Latouf
 
How encryption works
How encryption worksHow encryption works
How encryption worksMariko Saitoh
 
DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE
DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWAREDESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE
DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWAREAyanda Demilade
 

What's hot (7)

Trying to bottle the cloud forensic challenges with cloud computing
Trying to bottle the cloud   forensic challenges with cloud computingTrying to bottle the cloud   forensic challenges with cloud computing
Trying to bottle the cloud forensic challenges with cloud computing
 
online game over cryptography
online game over cryptographyonline game over cryptography
online game over cryptography
 
a hybrid cloud approach for secure authorized reduplications
a hybrid cloud approach for secure authorized reduplicationsa hybrid cloud approach for secure authorized reduplications
a hybrid cloud approach for secure authorized reduplications
 
Cryptography
CryptographyCryptography
Cryptography
 
CORA - Quantum Safe Cryptography
CORA - Quantum Safe CryptographyCORA - Quantum Safe Cryptography
CORA - Quantum Safe Cryptography
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE
DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWAREDESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE
DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE
 

Viewers also liked

Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobilesakhila immadisetty
 
Sniffer for Detecting Lost Mobile
Sniffer for Detecting Lost MobileSniffer for Detecting Lost Mobile
Sniffer for Detecting Lost MobileSeminar Links
 
Sniffer for detecting lost mobile ppt
Sniffer for detecting lost mobile pptSniffer for detecting lost mobile ppt
Sniffer for detecting lost mobile pptasmita tarar
 
E paper technology ppt
E paper technology pptE paper technology ppt
E paper technology pptHema Agali
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentationrajarose89
 
E-PAPER TECHNOLOGY
E-PAPER TECHNOLOGYE-PAPER TECHNOLOGY
E-PAPER TECHNOLOGYPranav Patel
 

Viewers also liked (9)

Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
 
Sniffer ppt
Sniffer pptSniffer ppt
Sniffer ppt
 
Sniffer for Detecting Lost Mobile
Sniffer for Detecting Lost MobileSniffer for Detecting Lost Mobile
Sniffer for Detecting Lost Mobile
 
Sniffer for detecting lost mobile ppt
Sniffer for detecting lost mobile pptSniffer for detecting lost mobile ppt
Sniffer for detecting lost mobile ppt
 
E paper technology ppt
E paper technology pptE paper technology ppt
E paper technology ppt
 
blue ray ppt
blue ray pptblue ray ppt
blue ray ppt
 
Finger reader
Finger readerFinger reader
Finger reader
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
 
E-PAPER TECHNOLOGY
E-PAPER TECHNOLOGYE-PAPER TECHNOLOGY
E-PAPER TECHNOLOGY
 

Similar to Confidential data storage and deletion

Typical system servicesProgram executionIO operationsFile Sy.pdf
Typical system servicesProgram executionIO operationsFile Sy.pdfTypical system servicesProgram executionIO operationsFile Sy.pdf
Typical system servicesProgram executionIO operationsFile Sy.pdfaptexx
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPandreasschuster
 
Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryptionRuban Deventhiran
 
Passwords are everywhere these days
Passwords are everywhere these daysPasswords are everywhere these days
Passwords are everywhere these daysEssaysREasy
 
Multi-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionMulti-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionCSCJournals
 
Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...Damir Delija
 
Secure deduplication-evault-endpoint-protection
Secure deduplication-evault-endpoint-protectionSecure deduplication-evault-endpoint-protection
Secure deduplication-evault-endpoint-protectionInka Traktman
 
cryptography for home users
cryptography for home userscryptography for home users
cryptography for home usersRachanaS6
 
Solve Big Data Security Issues
Solve Big Data Security IssuesSolve Big Data Security Issues
Solve Big Data Security IssuesEditor IJCATR
 
Data+security+sp10
Data+security+sp10Data+security+sp10
Data+security+sp10ismaelhaider
 
IT guide to data storage and protection
IT guide to data storage and protectionIT guide to data storage and protection
IT guide to data storage and protectiondoogstone
 
Module 5 security
Module 5   securityModule 5   security
Module 5 securityIT
 
Data encryption in database management system
Data encryption in database management systemData encryption in database management system
Data encryption in database management systemRabin BK
 
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Protecting Your Key Asset – Data Protection Best Practices V2.0   FinalProtecting Your Key Asset – Data Protection Best Practices V2.0   Final
Protecting Your Key Asset – Data Protection Best Practices V2.0 FinalVinod Kumar
 
How To Plan Successful Encryption Strategy
How To Plan Successful Encryption StrategyHow To Plan Successful Encryption Strategy
How To Plan Successful Encryption StrategyClickSSL
 
Database Security & Encryption
Database Security & EncryptionDatabase Security & Encryption
Database Security & EncryptionTech Sanhita
 
Choosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL ServerChoosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL ServerJerome J. Penna
 
New York Metro ISSA - PCI DSS Compliance - Ulf Mattsson 2009
New York Metro ISSA - PCI DSS Compliance - Ulf Mattsson 2009New York Metro ISSA - PCI DSS Compliance - Ulf Mattsson 2009
New York Metro ISSA - PCI DSS Compliance - Ulf Mattsson 2009Ulf Mattsson
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...Shakas Technologies
 
Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook Exclusive Networks ME
 

Similar to Confidential data storage and deletion (20)

Typical system servicesProgram executionIO operationsFile Sy.pdf
Typical system servicesProgram executionIO operationsFile Sy.pdfTypical system servicesProgram executionIO operationsFile Sy.pdf
Typical system servicesProgram executionIO operationsFile Sy.pdf
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
 
Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryption
 
Passwords are everywhere these days
Passwords are everywhere these daysPasswords are everywhere these days
Passwords are everywhere these days
 
Multi-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionMulti-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data Encryption
 
Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...
 
Secure deduplication-evault-endpoint-protection
Secure deduplication-evault-endpoint-protectionSecure deduplication-evault-endpoint-protection
Secure deduplication-evault-endpoint-protection
 
cryptography for home users
cryptography for home userscryptography for home users
cryptography for home users
 
Solve Big Data Security Issues
Solve Big Data Security IssuesSolve Big Data Security Issues
Solve Big Data Security Issues
 
Data+security+sp10
Data+security+sp10Data+security+sp10
Data+security+sp10
 
IT guide to data storage and protection
IT guide to data storage and protectionIT guide to data storage and protection
IT guide to data storage and protection
 
Module 5 security
Module 5   securityModule 5   security
Module 5 security
 
Data encryption in database management system
Data encryption in database management systemData encryption in database management system
Data encryption in database management system
 
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Protecting Your Key Asset – Data Protection Best Practices V2.0   FinalProtecting Your Key Asset – Data Protection Best Practices V2.0   Final
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
 
How To Plan Successful Encryption Strategy
How To Plan Successful Encryption StrategyHow To Plan Successful Encryption Strategy
How To Plan Successful Encryption Strategy
 
Database Security & Encryption
Database Security & EncryptionDatabase Security & Encryption
Database Security & Encryption
 
Choosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL ServerChoosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL Server
 
New York Metro ISSA - PCI DSS Compliance - Ulf Mattsson 2009
New York Metro ISSA - PCI DSS Compliance - Ulf Mattsson 2009New York Metro ISSA - PCI DSS Compliance - Ulf Mattsson 2009
New York Metro ISSA - PCI DSS Compliance - Ulf Mattsson 2009
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
 
Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook
 

Confidential data storage and deletion

  • 1. Confidential data storage and deletion With the decrease in cost of electronic storage media, more and more sensitive data gets stored in those media. Laptop computers regularly go missing, either because they are lost or because they are stolen. These laptops contain confidential information, in the form of documents, presentations, emails, cached data, and network access credentials. This confidential information is typically far more valuable than the laptop hardware, if it reaches right people. There are two major aspects to safeguard the privacy of data on these storage media/laptops. First, data must be stored in a confidential manner. Second, we must make sure that confidential data once deleted can no longer be restored. Various methods exist to store confidential data such as encryption programs, encryption file system etc. Microsoft BitLocker Drive Encryption provides encryption for hard disk volume and is available with Windows Vista Ultimate and Enterprise editions. This seminar describes the most commonly used encryption algorithm, Advanced Encryption System (AES) which is used for many of the confidential data storage methods. This seminar also describes some of the confidential data erasure methods such as physical destruction, data overwriting methods and Key erasure.