Computer Hard Drive |
Printer Hard Drive |
USB And Other Flash Media |
Flash Hard Drive |
Zip, Jaz and Rev disks
A zip disk is a medium capacity portable device used primarily for backing-up and archiving old personal computer files.
It holds far more data than a floppy disk and is capable of storing up to 750 MB of data.
Additional uses include:
- Archiving old emails or other files
- Storing unusually large files such as graphic images
- Keeping certain files separate from files on the hard disk
The zip disk was introduced by Iomega in 1994. Its popularity has significantly declined after the introduction of recordable
CDs and DVDs, and USB flash drives
The Jaz drive is a removable disk storage system introduced by Iomega in 1995. Unlike the zip, which uses floppy disk technology,
the Jaz is based on hard drive technology. Jaz disks are bigger versions of Zip disks and are capable of storing 2 GB of data.
The Jaz drive was superseded by the REV drive and is no longer manufactured. People have now opted for more modern technology such as
recordable CDs and DVDs, and USB flash drives.
The REV drive is a removable hard drive-based disk storage system, also introduced by iOmega in 2004. The disks are capable of
storing 70 GB of data. Like a standard hard drive, the REV system uses a flying head to read and write data to a spinning platter.
The drives are compatible with Macintosh, Windows and Linux operating systems.
Existing methods of removing data from Zip, Rev and Jaz disks
||This process works by overwriting the data with a combination of 1´s and 0’s. The level of security depends on the number
of times the entire disk is written over. It is best to use certified software that provides detailed reporting of the erasure
process such as Blancco software.
||Involves using a machine that produces a strong electromagnetic field to destroy the data on the disks.
||Can be accomplished using a variety of methods, including disintegration, incineration, pulverization, shredding, melting, sanding,
and chemical treatment.
This method does not actually destroy data but makes the drive inoperable preventing data recovery.
It should be carried out at an approved facility by trained and authorized personnel.
- Disks can be reused
- Software tools that provide detailed reporting of the erasure process are able to validate the erasure of every disk.
- Can be performed in-house eliminating the risk of media being stolen during storage or transit to a third party.
- Convenient way to erase data
- Capable of destroying all the data on the disk
- Can be used to destroy data on a variety of magnetic storage media
- Fast and simple process
- One time investment
- An effective way of destroying data if carried out correctly
- Large amounts of disks can be destroyed at once
- Cannot be used if the the media is damaged or is not writeable.
- Software tools that are unable to erase data on the locked/hidden sectors perform an incomplete erasure compromising
- Software tools that do not generate detailed reporting of the erasure process are unable to provide a gapless audit trail
- No way to guarantee that a particular degaussing machine is strong enough to destroy all the data on every disk
- Disks cannot be reused and is therefore not an environmentally safe approach
- Reduces the remarketing value of the disk
- Other components of the disk are also damaged making it difficult to verify the erasure process
- Degaussing machines are expensive and special care must be taken to protect nearby equipment
- Often involves using the services of a third party. Theft and uncontrolled handling can lead to unauthorized exposure of confidential data
- Degaussing does not provide reporting of the erasure process which is needed to prove regulatory compliance
- Can only be used on magnetic media
- Disks cannot be reused and is therefore not an environmentally safe approach.
- Reduces the remarketing value of the disk
- Usually has to be outsourced to a third party therefore compromising data security as theft and uncontrolled handling can lead to unauthorized exposure of confidential data
- The time period between the physical destruction of disks can create an internal storage and security challenge.
- Physical destruction does not provide reporting of the erasure process which is needed to prove regulatory compliance
- If not carried out correctly data can still be recovered from small broken, fragments of the disk