Data Wiping and Anti Forensic Techniques

Authors

  • Ajeet Singh Poonia Govt. College of Engineering and Technology, Bikaner, India

Keywords:

Data Sanitization Methods, Metadata, Cryptography, Stegnography, Electronic Gadgets

Abstract

In the era of information technologies every one using the smart phone, laptop, and many other electronic gadgets. These all have high storage capacity, so people use these devices to store photos, videos, music files, contacts details, calendar and even personal information also. People when see the new brands or new technologies in the market they just sell their old phones or electronic gadgets. While selling their gadgets, people behave like smart person and delete all information containing in it and in the memory card, hard disk etc. and they feel secure after deleting or formatting the data contained in that devices. Now as we know that deleting the information which is stored in smart electronic gadgets is not so easy. When we format or delete the information from the media storage it actually deletes the links of data blocks not the actual data residing in it. So it can be easily recovered your data by the help of some data recovery tools. When we sell our electronic gadgets to the shopkeeper, he can recover your personal photos, videos, important information, contact details etc. using the tools available in the market. So beware while selling your smart phone, laptops and other electronic gadgets those have storage capacity as other person can miss use it. In this paper we will cover how to efficiently wipe the memory, so that another person can’t recover the required data/information.

References

Defcon paper “Anti-forensics Techniques and AntiAnti-Forensics” by Michael Perklin.

“Counter forensics techniques –a brief overview” By Grant Thornton.

Modern Anti-Forensics “A Systems Disruption Approach”.

“Data Sanitization Method A List of Software Based Data Sanitization Methods” By Tim Fisher

Data Destruction Software Programs By Tim Fisher

Downloads

Published

2024-02-26

How to Cite

Poonia, A. S. (2024). Data Wiping and Anti Forensic Techniques. COMPUSOFT: An International Journal of Advanced Computer Technology, 3(12), 1374–1376. Retrieved from https://ijact.in/index.php/j/article/view/238

Issue

Section

Review Article

Similar Articles

<< < 1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.