Professional Documents
Culture Documents
Networks, Security,
Legality and the
Environment
&
Version 1
Networks, Security, Legality and the Environment
National 4 National 5
Technical Implementation Stand-alone or networked Peer-to-peer networks
(networking/connectivity) LAN/internet Client/server networks
Wired/wireless Wired, optical, wireless
For assessment purposes, pupils working at National 4 level need only learn the N4 content.
Pupils attempting National 5 assessments, coursework and a final exam should study N4 AND N5 content.
ISDD 2
Networks, Security, Legality and the Environment
What is a Network?
A network is two or more computers or devices connected together. Every computer or device on a
network can send and receive data from any of the other computers or devices connected to the network.
In class you use a network when you save or open files on the school server. Networks are being used for
more and more interactive applications every day. (e.g. e-mail, online shopping, online banking, social
networking and social gaming).
Stand-alone Computer
Computers can and still are being used on their own without being connected
to a network. All the software applications the user needs are held on the
computer and any peripheral devices (e.g. a printer) can be connected via
cables. If you have a computer which is not attached to a network it is called
a stand-alone computer. In order to share resources and data you need to
connect your computer to a network. All modern computers have the
capability to connect to a network.
Advantages of a LAN:
● Allows you to share data, information (file sharing, e-mails etc)
● Allows you to share expensive computer hardware. e.g. printers, large hard disks
● Allows many computers to share one Internet access point
● Very fast data transmission (many Gb of data transferred per second is possible)
● Very reliable data transmission (the short distances mean very few errors)
Each computer in the school is part of the school LAN. These allow each room to share files and
peripherals through cables and wall sockets.
All computers and peripherals are connected to the network with cables, connected through sockets in
the wall.
The cables from each computer’s wall socket run round the
classroom, under floors or through roof space eventually
arriving at a switch unit. Every computer in the school
connects to a switch unit in a cabinet like the one shown.
ISDD 4
Networks, Security, Legality and the Environment
WANs often connect lots of smaller local area networks. The transmission media used to communicate
across a WAN are long distance telecommunication systems like telephone lines or satellite technology.
The best example of a WAN is the Internet which is often described as “a network of networks”.
Advantages of a WAN:
Ÿ Allows the business to share data, information
Ÿ Allow users to send messages between offices around the world
Ÿ Allows access to files from any computer anywhere on the network
Ÿ Allows businesses to provide customers with services.
For example, ATMs (cash machines) are computers attached to a bank’s WAN
Other Devices
It’s not just desktop computers that can be connected to a network (LAN or WAN)
Smart TVs
MP3 Players
Laptops
Tablets
Smart Phones
Games Consoles
ISDD 6
Networks, Security, Legality and the Environment
The Internet
The Internet is a global system of interconnected computer networks (LANs & WANs) that enables
computers and peripheral devices worldwide to connect with each other using a range of
telecommunications systems. It can be thought of as many different, smaller networks connected
together. The Internet allows users to access files, for example, databases and web pages stored all round
the world. This information can be found using search engines and viewed using browsers.
Computer uses often misuse the terms Internet and world wide web. A good way to remember the
difference between them is to remind yourself that the Internet is hardware and the world wide web is
software and data (or information). The world wide web is stored on the Internet.
Search Engines
These help users find their way around the world wide web (www) by
searching all web pages for keywords. Examples:- Google, Ask,
Yahoo.
Browsers
These programs allow Internet users to view data on the World Wide Web (WWW).
Examples:- Internet Explorer, Firefox, Google Chrome.
Other services available on the Internet and world wide web include online banking, online shopping,
e-mail, forums, file sharing, chat rooms and other examples social networking (Facebook, Twitter etc.).
Network Interface
Card Wireless Network
Interface Card
Every device that is connected to a LAN will need a network interface card to send and receive the data
sent to and from another device on the network.
ISDD 8
Networks, Security, Legality and the Environment
Coaxial: The central cable that transmits the data is surrounded by a shield of copper
braiding which protects the central cable from interference. Found in places like
factories and manufacturing plants where there is a large amount of possible
interference. Coaxial cable is more expensive than twisted pair.
Fibre Optic
Fibre Optic cable is made up of fine strands of glass that carry pulses of light.
These pulses of light carry the data being transferred. It is more secure than
copper cabling as any break in the cable can be detected. Fibre optic cable
does not suffer from electromagnetic interference and can transmit data at
very high speeds.
Fibre optic cable is commonly used to connect buildings together in a LAN
although it is expensive. It can also be used between floors in a building. It is
also the preferred medium for telephone lines. If you have a broadband router
at home it will normally be connected to the Internet using a fibre optic
telephone line.
The most popular standard for wireless networking is Wi-Fi, which uses radiowaves to transmit data
through the air. Wi-Fi can connect devices up to 100 meters apart at a data transfer rate of 600 Mbps.
Bluetooth is another wireless standard which uses short, wavelength microwaves to transmit data. It is
commonly used for mobile phones and a variety of other peripheral devices. Bluetooth can only cover an
area up to around 10 metres and transfers data at a rate of 721 Kbps.
Wireless communications also exist for wide area networks. The image below shows microwave towers.
The microwave dishes are positioned in high places and pointed towards another microwave tower to
form a relay. Currently the furthest distance between two towers in 360km across the Red Sea. This
form of communication is capable of transferring extremely large quantities of data very quickly.
The main disadvantage with a wireless connection is that security can be a problem. Data has to be
encrypted to prevent hackers from accessing networks without authorisation. If you have a secure
wireless router (hub) at home you’ll have noticed a password is required to access the router.
ISDD 10
Networks, Security, Legality and the Environment
The owners currently have a telephone land line but no Internet access. They do have the
following Internet enabled devices in the house:
● A desktop computer in the Drawing Hall (living room)
● A Smart TV in the downstairs Bedroom
● An ipod docking station in the Kitchen
● A PS4 games console upstairs in the Master Bedroom with an HD TV
● A laptop computer in the second upstairs bedroom
● 3 mobile smart phones
You have been given the job of a network consultant. Describe how you would network the
house to provide Internet access to all of the above devices. Include in your description the
following…
1. the type of router you would buy and where you would position it
2. will your network be wired, wireless or both
3. if required, what type of cables will you install and what rooms will you run the cables
to and from.
E-mail your completed description to your teacher.
Types of Network
Client / Server Networks
In a client/server network, users work at client workstations.
A workstation may be a desktop or laptop computer with a
network interface card (to allow communication with the
server) or other devices such as tablets with Wi-Fi
capability. One or more servers may be responsible for
allocation resources such as printing, Internet access, email,
file storage etc.
Servers are also responsible for security on the network.
Users working at client workstations are usually required to
log in. This identifies the users to the server which then
allocates the users different levels of access.
Server types
Servers provide functions to the client/server network.
Common servers are:
File Server This provides all users of the network with centrally
controlled file storage. Every user will have their
own allocated storage space and will be given read
only or read/write access to shared files. The image
shows a file server with a bank of hard disk drives.
Print Server This allows data sent from client workstations to be
output to the appropriate printer on the network. The set of jobs waiting to be
printed is called a print queue. Jobs may be given priorities determining which
prints first.
Mail Server This allows users to send emails and have them stored on the server hard drives.
Web Server This server connects to the Internet via a security system called a firewall
(software which prevents unauthorised access from outside the network). It also
allows frequently accessed Web pages to be cached (stored) on the server’s hard
drives so that they can be accessed faster.
Application Server This allows programs (applications) to be held centrally on a server and loaded
from there into the RAM of individual client workstations.
ISDD 12
Networks, Security, Legality and the Environment
Peer-to-Peer Networks
In a client/server network the central server controls the running of the network. Peer-to-peer networks
allow users to share resources and files located on their computers and to access shared resources found
on other computers in the network.
On peer-to-peer networks, all computers are considered equal. Peer-to-peer networks are designed
primarily for small local area networks with, typically, up to six machines. Home, small offices or
businesses are typically Peer-to-peer networks.
Peer-to-Peer Client/Server
Constituent Elements
Resources
Storage
Backups
Security
Environment
Complete the table by placing each of the statements below under the correct network type
and beside the correct heading.
Ÿ With a central backing store, regular backups can be organised or implemented easily.
Ÿ There is no centralised storage so each workstation stores data independently.
Ÿ There is no mechanism to manage access to the network. Often the individual
workstation can only set up whether all or no users can access the files.
Ÿ Best suited to a ‘trusting environment’ like the home.
Ÿ All resources on the network are managed by servers which provide access to
resources such as data files, printers and web access to the workstations.
Ÿ Holds a database of all Usernames, Passwords and permissions, detailing which files
and folders the user can access.
Ÿ All computers are managed independently and have equal status when communicating
with each other.
Ÿ Each workstation backs up data independently. It is very difficult to backup the whole
network as there is no centralised backing store.
Ÿ It is commonly used in businesses and organisations.
Ÿ Network composed of workstations operated by users, and central computers which
control the resources to all workstations.
Ÿ Data is stored in a central backing store monitored by the server.
Ÿ Allows users to share resources and files located on their computers and to access
stored resources found on other computers on the network.
ISDD 14
Networks, Security, Legality and the Environment
Cloud Computing
Cloud computing is the use of hardware and software to deliver services over a network (typically the
Internet).
Companies selling cloud services use banks of servers and hard disks which are accessed remotely by
users.
Services available over the cloud include:
● Online Data Storage
Users can purchase storage space which can be accessed from any Internet connection. The cloud
provider will backup the users’ data to ensure it is never lost.
● Software Hosting
Rather than programs being installed on each computer system, they are installed on the cloud
servers and downloaded when needed.
● Virtual Servers
Users can maintain servers which can be used to host database or websites.
Cloud services can be accessed by any device that has Internet access and the software or app to do so.
ISDD 16
Networks, Security, Legality and the Environment
Security Risks
As computers have taken over a greater role in today’s society and technology has advanced,
opportunities for a different type of crime have been created. All networks need to have security
measures in place or they could be remotely accessed by a hacker.
A hacker is a computer enthusiast who spend lots of time and effort trying to gain
unauthorised access to a computer system. Hackers hack into systems for fun or
simply for the challenge. If they are malicious they may disrupt systems by
changing, deleting or copying data while others are deliberately intent on
defrauding companies. Millions of pounds are lost every year because of
computer fraud when hackers steal money electronically.
Nowadays a great deal of time, effort and money is spent attempting to make computer networks as
secure as possible from unauthorised access.
It is particularly important to make sure wireless networks are secure because wireless data can be easily
intercepted. Both wired and wireless networks should be password protected and the transferred data
encrypted to make sure only authorised people can access the network.
Hackers all over the world have been put in prison for illegally accessing computer systems. A British
man was charged with hacking offences in the USA for gaining unauthorised
access to Pentagon files.
A group calling themselves ‘Anonymous’ hacked into Facebook systems and
illegally obtained passwords and other personal information.
Malware
The term ‘Malware’ (Malicious Software) is used to describe
any piece of software which is malicious, or damaging to a
computer. Viruses, worms and trojan horses are some
examples of malware.
Viruses
A virus is a malicious piece of code which can cause damage to a computer system. It is a computer
program that attaches itself to programs and files on your computer.
You can tell when your computer has a virus as it starts doing unusual things. These include data going
missing, space being used up on your hard disk or simply your computer running slowly. If a computer
on a network has a virus, it can easily spread to the other computers through the network. A virus can
even cause a computer to break down by changing its voltage settings.
For a piece of computer code to be a virus is has to do two things:
1. create copies of itself to create a new file
2. attach itself to a file.
Worms
A worm copies itself like a virus but it can not attach itself to a file. For this reason it is not technically
a ‘virus’ but it can have the same effect. They can quickly spread by ‘crawling’
through networks.
The most harmful worms reside in the computer’s memory only. They don’t save
any code to hard disks or any other type of backing storage. This means that when
you switch your computer off the worm is lost.
MS Blast was a famous worm which forced the user’s computer to run a
Windows Update. In just 24 hours, MS Blast spread onto some 120,000
computers around the world. It didn’t cause any harm to the user’s computer
but it crashed Microsoft’s systems because so many computers were attempting
to download the update at the same time. The teenage hacker who created MS
Blast was jailed for 18 months.
Trojans
A trojan is a program which can attach itself to a file but cannot self-replicate. It is a program which
looks harmless and tricks you into running it on your computer. It then carries out its
real task, for example displaying adverts on the desktop or installing unwanted toolbars.
The most common thing they do is open a ‘back door’ to give remote access to the
computer. It is named after the Trojan Horse story from classical history when the
Greek warriors hid inside a huge wooden horse to gain access to the city of Troy.
Note that the term ‘virus’ is often used loosely to cover Worms and Trojans too.
ISDD 18
Networks, Security, Legality and the Environment
Spyware
Spyware is a type of malware which secretly monitors the user’s computer. These programs gather
information about you from your computer. This can be personal information or information about
the websites you have visited.
A keylogger is an example of spyware. The program detect the
keys a user presses on a keyboard. The ASCII code for each key is
identified and saved in a file which can then be analysed. It is most
commonly used by hackers to detect usernames, passwords and
credit card numbers.
Online games are especially targeted by hackers using keylogger
technology to detect usernames and passwords.
Phishing
Phishing is an attempt to get your personal information such as your login or bank details by
pretending to be, for example, a charity or claiming that you have won a prize. Phishing can use key
loggers, trojans, spyware and even ordinary e-mail to steal your personal information. If you are a
victim of phishing you may receive an email asking you to confirm your bank account details or a
password. The authors of Phishing e-mails spend a lot time ensuring that the e-mails look as
legitimate as possible.
Most companies would never ask for this information in an email so you should not reply to it.
Examples of fake emails:
Online Fraud
Online fraud is the use of the Internet to commit crime for financial gain.
There are many types of online fraud…
● Bank and cheque fraud
● Charity donation fraud
● Government agency scams
● Holiday fraud
● Identity theft (see later)
● Loan scams
● Online shopping fraud
Identity Theft
This is when people steal your personal information such as bank account details. The information could
then be used to:
● shop online
● apply for a loan
● withdraw money from your account
● get a work permit to stay in a country
● pretend to be another person to rent a property
● and many more…
Keyloggers, trojans, spyware and ordinary email can be used to steal your identity.
ISDD 20
Networks, Security, Legality and the Environment
Network
Servers
Network
Client PCs
Methods Used
Resource starvation This means using up a network resource (server processor time,
network storage) so that real users can’t access it.
Bandwidth consumption This means flooding the network with useless traffic. An example of
this is flooding an email server until it either crashes or denies email
services to legitimate users because its too busy.
Hacking network software If networking software like firewalls or operating systems are not
protected or have bugs in them, hackers can use these weaknesses to
crash servers.
Attacking the routers Routers are vulnerable to PING (Packet INternet Groper) attacks
where bad data is sent.
Domain Name Server This type of attack disrupts network access by causing the server to
(DNS) attacks keep looking for things that do not exist. This means that correct
requests are not dealt with.
From: no_reply@emailonline.yourbank.com
Subject: Account Status
Dear Customer,
Due to recent activity on your account, we have issued the following
security requirements. For your security, we have temporarily prevented
access to your account. Bank of Scotland safeguards your account when
there is a possibility that someone other than you tried to sign on. You
may be getting this message because you signed in from a different
location or device. If this is the case, your access may be restored when
you return to your normal sign on method. For immediate access, you are
required to follow the instruction below to confirm your account in order
to secure your personal account informations.
Click To Confirm Your Account
Regards,Carter Franke
Chief Marketing Officer
CardMember Services
ISDD 22
Networks, Security, Legality and the Environment
Security Precautions
Passwords
The most common way of controlling access to a computer system or
network is to use a system of IDs (user names) and passwords.
You must be careful to use passwords that are hard to break. Favourite
bands, family names etc are all easily to hack.
Encryption
Encryption is a means of encoding/scrambling data using encryption keys. Today, very sophisticated
encryption keys are used involving carrying out calculations on the binary data. For an encryption key
to be effective it should take a computer many years to work out the decryption algorithm.
Message Received
Message Sent
HELLO
HZPMTFJQ@VLKQ HZPMTFJQ@VLKQ
HELLO
Message Message
Encrypted Decrypted
Encrypting and decrypting files is big business as companies and governments race to protect their
own information and access others. The article below discusses the building of a “quantum” computer
by the American government developed specifically to crack encryption keys.
Data is scrambled using an DataData is unscrambled
is scrambled using an(decrypted) Data is unscrambled (de
encryption on the proper receiver’s on the proper receiv
NSAkey (e.g. the
Seeks to access
Buildkey
Quantum encryption key
Computer Tocomputer (e.g.
Crack Most the access key
TypesPCof Encryption
(e.g. another computer (e.g. anothe
on a wireless home hub) on a wireless home hub)
In room-size metal boxes secure connected to the wireless hub)leaks, the American
against electromagnetic connected to the wirele
National Security Agency is racing to build an $80 million computer that could
break nearly every kind of encryption used to protect banking, medical,
business and government records around the world.
For the NSA's purposes, a quantum computer would be able to crack an
encryption key much more quickly than traditional computers. The standard encryption tool
today is called RSA and in 2009, it took hundreds of traditional computers nearly two years
to crack this 768-bit code. Typically, 1024-bit encryption keys are used for online banking,
medical, government and business records, which could take 1,000 times longer to crack.
The development of a quantum computer has long been a goal of many in the scientific
community, with revolutionary implications for fields such as medicine as well as for the
NSA’s code-breaking mission. With such technology, all current forms of public key
encryption would be broken, including those used on many secure Web sites as well as the
type used to protect state secrets.
Firewall Software
Network managers keep their networks safe and secure by installing firewall software or firewall
hardware. Firewalls help prevent unauthorised access to computers by stopping hackers accessing
private information stored on computers.
Network
Firewall software or hardware can allow us Hacker
Client PCs
to block the IP address of a computer we
think might be trying to access our
computers illegally. Network
Servers
Anyone who gains unauthorised access to a Internet
computer system is breaking the Computer
Misuse Act.
Firewall
Software/Hardware
Biometric Systems
Biometrics is the science and technology of measuring and analysing
biological data.
In computing, biometrics refers to technologies that measure and analyse
human body characteristics, such as DNA, fingerprints, eye retinas and
irises, voice patterns, facial patterns and hand measurements, for
authentication purposes.
Biometrics systems can be used to limit access to computer rooms or computer systems.
Ÿ Retina & iris recognition
The person’s unique retina and/or iris are recognized using a
biometric sensor. If the unique pattern in their eye is recognised
the person is allowed access to the computer room.
Ÿ Fingerprint recognition
Every person’s fingerprint patterns are different.
By reading the fingerprint with a scanner that reads
key points in the pattern the user may be recognised.
Ÿ Face recognition
Face recognition uses biometric sensor to map landmarks (nodal
points) on the users face. Examples of landmarks are:
Distance between the eyes
Width of the nose
Depth of the eye sockets
The shape of the cheekbones
The length of the jaw line
These measurements are converted to numerical values which are stored in a database
The advantage of using biometric systems for security is that it is much harder to forge a fingerprint or
retina pattern than it is to hack to system that relies on passwords or PIN numbers. Additionally, there is
no need for the user to remember passwords.
ISDD 24
Networks, Security, Legality and the Environment
Anti-Virus Software
Anti-virus software is used to prevent computer viruses from damaging computer systems. It locates the
virus program code and then quarantines (locks it away from the rest of the system) and deletes it.
There are many anti-virus programs available but they all operate in similar ways. Virus scans are
performed as often as the user requires (hourly, daily weekly) by changing settings in the program. At
regular intervals, the software will download ‘definitions’ of new viruses, allowing the software to keep
up-to-date with the latest threats.
Security Suites
Nowadays companies selling security software offer more than just anti-virus software. The following
packages may come bundled as a Security Suite:
Ÿ Antivirus protection
Ÿ Firewall
Ÿ Spamkiller
Ÿ Spyware protection
Ÿ E-mail protection
Note that security software is often sold as a time-limited licence, usually for one year. This forces
customers into an annual payment if they wish to keep their computer systems protected.
ISDD 26
Networks, Security, Legality and the Environment
The act states that if the hacker accesses protected data so that they can use the data for illegal
purposes (selling data on, fraud, bribery etc) they may also be charged under the act.
There may be several examples of how this part of the law could be broken:
Deliberately crashing a website by overloading the host server (DOS attacks).
Deliberately spreading viruses (creating a virus does not break the law).
A few examples of infringements of the CD&P Act relating to computing are listed below:
Ÿ Copy a single copy of software onto multiple machines without buying additional licences.
Ÿ Download works (music, films etc) from the Internet without the owner’s permission to use it
Ÿ Put software you do not own, including shareware you have not paid for, onto any machine
Ÿ Copying works and distributing them to other people
ISDD 28
Networks, Security, Legality and the Environment
Examples of this could be owning software using to illegally connect to password protected Wi-Fi
hotspot or owning hardware used to copy phone SIMs.
Sending a message that is deliberately designed for the purpose of causing annoyance, inconvenience
or needless anxiety to another.
This relates to ‘trolling’/‘stalking’ on social networking sites or again could relate to e-mail or texts.
a) Steve has ‘chipped’ his Sky HD box so he doesn’t have to pay for movies or sport.
b) The owners of Rockbuster Video are reviewing their computer records of the last 15
years and discover account details of customers who have not been video club
members for 10 years.
c) John has downloaded a copy of the new Hobbit film from the Internet. He makes
several copies and sells them to the public at a car boot sale.
d) Tracy is on holiday in London. While sitting in her holiday home she connects to the
neighbours unlocked Wi-Fi connection.
e) David knows his friend’s Facebook login details. He logs in and adds inappropriate
comments on his friend’s page causing him to be banned by Facebook.
f) Jean-Michelle buys a multiple DVD copying machine. Tomorrow he will start
copying films to sell on his website.
g) Barry is opening a new restaurant and surveys passers-by in the High Street about
what food they would like to see in his new place. He records their personal details
and hopes that he can use the survey data to send advertising flyers to them later.
h) Niander receives a threatening e-mail from a customer. She responds saying that she
has posted the e-mail on facebook and invited Internet Trolls to tell the customer what
they think of the threatening e–mail.
i) Jean has been sent a reminder letter for a bill she’s sure she paid two weeks earlier.
She asks the company for a printout of her account but they refuse, saying they do not
have the available staff to print out the details.
j) Matthew has just launched his new Gamers website for Minecraft enthusiasts. The
homepage of the website contains an animated introduction containing the Foo
Fighters song “Pretender”.
k) Kula uses a bit-torrent website to download the Christmas special of Dr Who onto his
iPod. He tells his friends that this is not against the law as the episode is available for
free on BBC iPlayer.
l) Penny is unhappy with a comment her teacher made on a recent report. While the
teacher is dealing with an unruly pupil Penny uses the teachers computer to access her
report and change the comment.
ISDD 30
Networks, Security, Legality and the Environment
The law relating to health and safety issues for work with computers is contained in the Health and
Safety (Display Screen Equipment) Regulations 1992.
In addition to providing a healthy working environment, employers are also responsible for:
Ÿ Conducting a risk assessment (measuring length of time at workstations, assessing equipment use).
Ÿ Providing free eye exams for staff who continually use computer systems.
Ÿ Providing training in correct computer use (posture, positioning of equipment, the importance of
regular short breaks, how to use a mouse)
Environmental Impact
Manufacturers of electronic devices are becoming more responsible for the impact their
products have on the environment.
Greenhouse gases such as carbon dioxide and methane are harmful to the earth.
The process of creating and storing electricity produces a great deal of carbon
dioxide, which is a greenhouse gas, therefore, any device which uses electricity
(even in battery form) will contribute to the problem and have a ‘carbon footprint’.
The carbon footprint of an organisation can include the amount of electricity it
uses, the amount of toxic waste it produces and the amount of waste it sends to
landfill sites.
To reduce carbon footprints, manufacturers of electronic devices need to consider how much energy
their products will use. “Green” devices are devices which use low levels of electricity.
Computer users can reduce their carbon footprint by:
Ÿ Buying green computers and peripherals
Ÿ Switching off computers when they are not in use
Ÿ Setting computers, monitors, hard disk drives and peripherals to energy saving modes
ISDD 32
Networks, Security, Legality and the Environment
Office equipment is the fastest growing energy user in the business world,
consuming 15% of the total electricity used in offices.
There are also associated costs which are often overlooked, specifically
increasing cooling requirements to overcome the additional heat computer
equipment produces.
What’s in My PC?
Material Proportion
Plastic 23%
Ferrous metals 32%
Non-ferrous metals 18%
Electronic boards 12%
Glass 15%
Under European Law, manufacturers have a legal responsibility to comply with the Waste Electrical and
Electronic Equipment Directive.
Disposing of Data
Under the Data Protection Act, organisations have to ensure that data is kept for no longer than is
necessary. When data is no longer required it should be destroyed or deleted to prevent it from being
accessed.
This is not a simple as deleting the files. When files are deleted, the operating system changes it’s file
index to mark the blocks on the hard disk as being empty. The data in the file remains there until another
file is written over the top of it. Deleted files can be easily recovered by recovery programs.
According to most governments and standards organizations, there are only three effective methods of
erasing a hard drive:
Ÿ Erase the hard drive using free data destruction software
By far, the easiest way to completely erase a hard drive is to use free data destruction software,
sometimes called hard drive eraser software or disk wipe software.
Regardless of what you call it, a data destruction program is a piece of software designed to overwrite
a hard drive so many times, and in a certain way, as to make the ability to extract information from
the drive nearly impossible.
Ÿ Use a Degausser to erase the hard drive
Another way to permanently erase a hard drive is to use a degausser to
disrupt the magnetic domains on the drive - the very way that a hard
drive stores data.
Ÿ Physically destroy the hard drive
Physically destroying a hard drive is the only way to absolutely and forever ensure that the data on it
is no longer available. Just as there is no way to extract the written information from a burned piece of
paper, there is no way to read the data from a hard drive that is no longer a hard drive.
You can destroy a hard drive yourself by nailing or drilling through it several times, making sure the
hard drive platter is being penetrated each time. In fact, any method of destroying the hard drive
platter is sufficient including sanding the platter after being removed.
ISDD 34
Networks, Security, Legality and the Environment
A Flatbed
Scanner
An Empty Laser
Printer Cartridge