23
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Consumer’s PCs: A Study of Hard Drive Forensics, Data Recovery, and Exploitation

Pages 3-15 | Published online: 10 Sep 2014

References

  • Garfinkel, S.L. & Shelat., A. (2003). Remembrance of Data Passed: A Study of Disk Sanitization Practices. IEEE Security and Privacy, 1 (1), 17–27.
  • Gutmann, P. (2006). Secure Deletion of Data from Magnetic and Solid-State Memory. In Proceedings of the 6th USENIX Security Symposium, San Jose, California, U.S.A.
  • Jones, A. (2005). How Much Information Do Organizations Throw Away? Computer Fraud and Security, 5 (3), 4–9.
  • Kwon, Y.C., Lee, S. W., & Moon, S. (2006). Advances in information and computer security. First International Workshop on Security, IWSEC 2006, Kyoto, Japan.
  • Microsoft, Inc. (2007). “WD 2000: How Word for Windows Uses Temporary Files.” Retrieved on June 6, 2007 from <http://support.microsoft.com/kb/q211632/=.
  • Minasi, M. (1999). The Complete PC Upgrade & Maintenance Guide, Tenth Edition. San Francisco, CA: Sybex.
  • Rosencrance, L. (2007).“Ebay Auction Yields Drive Holding Political Data.” Computer World. Retrieved on October 4, 2007 from <http://www.computerworld.com=.
  • Schneier, B. (2005). Risks of Third Party Data. Communications of the ACM. 48 (5), 136.
  • TechWeb News. (2005). “Seven in 10 Secondhand Hard Drives Still Have Data.” Information Week. Retrieved on_December 4, 2007 from <http://www.information_week.com/story/showArticle.jhtml?articleID=163702381=
  • United States Defense Security Service. (2006). National Industrial Security Program Operating Manual (NIPSOM). Washington: GPO.
  • United States. Department of the Navy. Naval Information Systems Management Center. Remanence Security Guidebook. (NAVSO P-5239-26). Washington: GPO 1993
  • Weeks, K. (2007). “Hospitals Protect Data By Erasing Old Hard Drives.” San Diego Business Journal, 23.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.