{"title":"数据擦除工具的评价","authors":"T. Martin, Andrew Jones","doi":"10.15394/JDFSL.2020.1615","DOIUrl":null,"url":null,"abstract":"The permanent removal of data from computer disks has always been problematic. This has been due, in part, to the lack of availability of tools, and in part due to the misperception by the user that when a file is deleted it is destroyed and cannot be recovered and that when a disk is formatted, the data is destroyed. In this paper, we examine a number of the commonly available tools to determine how effectively they function and whether they achieve the aim of the effective destruction of data","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.6000,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"An Evaluation Of Data Erasing Tools\",\"authors\":\"T. Martin, Andrew Jones\",\"doi\":\"10.15394/JDFSL.2020.1615\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The permanent removal of data from computer disks has always been problematic. This has been due, in part, to the lack of availability of tools, and in part due to the misperception by the user that when a file is deleted it is destroyed and cannot be recovered and that when a disk is formatted, the data is destroyed. In this paper, we examine a number of the commonly available tools to determine how effectively they function and whether they achieve the aim of the effective destruction of data\",\"PeriodicalId\":43224,\"journal\":{\"name\":\"Journal of Digital Forensics Security and Law\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.6000,\"publicationDate\":\"2020-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Digital Forensics Security and Law\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.15394/JDFSL.2020.1615\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Digital Forensics Security and Law","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.15394/JDFSL.2020.1615","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
The permanent removal of data from computer disks has always been problematic. This has been due, in part, to the lack of availability of tools, and in part due to the misperception by the user that when a file is deleted it is destroyed and cannot be recovered and that when a disk is formatted, the data is destroyed. In this paper, we examine a number of the commonly available tools to determine how effectively they function and whether they achieve the aim of the effective destruction of data