Abstract

Large amounts of information are stored in hard disk drives. In modern information systems. Deleting files using the operating system or reformatting the magnetic drive does not delete the data. There is an opportunity to recover the data by the violator in the conditions of moving the drive from the controlled premises for disposal, sending for repair, theft, replacement, substitution, donation, etc. The known information destruction methods are not always economical and do not fully meet the reliability requirement. The modern methods selection of information recovery is carried out. During the implementation of software methods for destroying information, the overwriting of the masking sequence above deleted information is carried out. This does not guarantee its destruction, because the motion path of the hard disk recording head does not exactly coincide with the magnetic track, and residual magnetization regions carrying information about previous records are formed at the edges. It is assumed that the intruder owns one of the most advanced high-resolution information recovery technologies for studying the areas of residual magnetization. The technology of magnetic scanning microscopy is proposed, which is closely associated with an increase in the recording density of information on storage devices. The carried out operating principles analysis of modern magnetic scanning microscopes made it possible to create conditions for the model development of an unauthorized information recovery channel that includes an information source representing the drive surface and the intruder’s equipment for access to residual information. A source with an intruder connects an information transmission channel, which is proposed to be described by a model of a binary symmetric channel without memory. The erroneous recovery probability estimates of deleted information block and the errors average number in an information block are given. The results can be recommended to specialists in the field of building subsystems to protect information from unauthorized access to information systems for the synthesis of an adequate model of the intruder, development and selection, as well as assessing the developed methods reliability for the confidential information destruction.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.