词条 | Crypto-shredding |
释义 |
This requires that the data have been encrypted. Data comes in these three states: data at rest, data in transit and data in use. In the CIA triad of confidentiality, integrity, and availability all three states must be adequately protected. Getting rid of data at rest like old backup tapes, data stored in the cloud, computers, phones, and multi-function printers can be challenging when confidentiality of information is of concern; when encryption is in place it allows for smooth disposal of data. Confidentiality and privacy are big drivers of encryption. MotiveThe motive of deleting data can be: defect product, old product, no further use of data, no legal right to retain data any longer, etc. Legal obligations can come from rules like: the right to be forgotten, the General Data Protection Regulation, etc. UseIn some cases everything is encrypted (eg. harddisk, computer file, database, etc.) but in other cases only specific data (eg. passport number, social security number, bank account number, person name, record in a database, etc.) is encrypted. In addition the same specific data in one system can be encrypted with another key in another system. The more specific each piece of data is encrypted (with different keys) the more specific data can be shredded. Example: iOS devices use crypto-shredding when activating the "Erase all content and settings" by discarding all the keys in 'effaceable storage'. This renders all user data on the device cryptographically inaccessible.[2] Best practices
Security considerations
The mentioned security issues are not specific to crypto-shredding, but apply in general to encryption. In addition to crypto-shredding, data erasure, degaussing and physically shredding the physical device (disk) can mitigate the risk further. See also
References1. ^[https://books.google.nl/books?id=nMwVDAAAQBAJ&pg=PT668&dq=isbn:1119278651+crypto-shredding&hl=nl&sa=X&ved=0ahUKEwj51IGKoqHTAhUoKsAKHZWwCaoQ6AEIJDAA#v=onepage&q=isbn%3A1119278651%20crypto-shredding&f=false Crypto-shredding in 'The Official ISC2 Guide to the SSCP CBK'] {{ISBN|1119278651}} {{Cryptography navbox}}2. ^[https://uit.stanford.edu/security/data-sanitization Crypto-shredding using effaceable storage in iOS on stanford.edu] 3. ^[https://www.ncsc.nl/english/current-topics/factsheets/factsheet-post-quantum-cryptography.html Factsheet post quantum cryptography on ncsc.nl] 4. ^[https://application.wiley-vch.de/PQC_for_Dummies Post Quantum-Crypto for dummies on wiley-vch.de] 3 : Public-key cryptography|Cryptography|Key management |
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。