Data Sanitization Technique
(Redirected from Secure Deletion Technique)
Jump to navigation
Jump to search
A Data Sanitization Technique is a data security technique that renders data unrecoverable on storage media.
- AKA: Data Wiping Technique, Data Erasure Technique, Secure Deletion Technique, Data Purging Technique, Information Sanitization Technique.
- Context:
- It can typically target Storage Media Layers including logical layers and physical layers.
- It can typically meet Data Sanitization Standards such as NIST SP 800-88 guideline.
- It can typically prevent Data Recovery Attacks through irreversible data transformation.
- It can often vary by Storage Technology Type and media characteristics.
- It can often require Sanitization Verification Methods for effectiveness confirmation.
- It can range from being a Software Data Sanitization Technique to being a Hardware Data Sanitization Technique, depending on its sanitization implementation layer.
- It can range from being a Quick Data Sanitization Technique to being a Thorough Data Sanitization Technique, depending on its sanitization completeness level.
- It can range from being a Standardized Data Sanitization Technique to being a Proprietary Data Sanitization Technique, depending on its sanitization protocol type.
- It can range from being a Non-Destructive Data Sanitization Technique to being a Destructive Data Sanitization Technique, depending on its media preservation status.
- It can integrate with Storage Management Systems for automated sanitization execution.
- It can support Compliance Requirements through certifiable sanitization methods.
- ...
- Examples:
- Data Sanitization Technique Categories, such as:
- Data Sanitization Technique by Target, such as:
- ...
- Counter-Examples:
- Data Encryption Technique, which obscures but preserves data content.
- Data Compression Technique, which reduces but retains data content.
- Data Masking Technique, which hides but maintains data structure.
- See: Data Security Technique, Storage Security Method, Information Protection Technique, Media Sanitization Process, Data Destruction Process, Security Control Technique, Privacy Protection Method, Compliance Verification Method, IT Security Standard, Risk Mitigation Technique.