Written By Abhishek Jain
Updated on Jan 18, 2021
Min Reading 3 Min
There are several different techniques of data destruction. An organization needs to choose a suitable technique based on factors like storage media type, internal policy mandates, audit and compliance requirement, logistic and financial constraints, technical expertise, etc. This section outlines the three most prevalent data destruction techniques, namely:
The Overwriting technique is based on replacing the target data stored on all user addressable memory locations with non-sensitive data or binary patterns. Commercially, overwriting is also known as data erasure, which is implemented using specialized software tools. The data erasure software overwrites the addressable storage locations on the media using specific binary patterns and passes based on global data erasure standards such as NIST 800-88, DoD 5220.22-M, etc.
Advantages of Overwriting / Secure Data Erasure:
Disadvantages of Overwriting:
The Degaussing technique is based on the demagnetizing principle, wherein a degausser is used to neutralize the magnetic field of magnetic storage devices such as hard disk drives, thereby destroying the data stored on the media. Degaussing is a traditional technique compared to Overwriting or data erasure and therefore not optimal for destroying the data stored on emerging magnetic media that have stronger magnetic fields or complex make & design such as hybrid drives.
As per the NIST SP 800-88 Guideline , "Existing degaussers may not have sufficient force to degauss evolving magnetic storage media and should never be used for flash memory-based storage devices or magnetic storage devices that contain non-volatile non-magnetic storage."
Advantages of Degaussing:
Disadvantages of Degaussing:
Shredding is a physical destruction technique that disintegrates the storage media such as hard disk drives, solid-state drives, USB flash drives, optical drives, smartphones, etc. It breaks down (shreds) the storage media like the drive platter along with the electronic and mechanical components into minute pieces, in dimensions as small as 2 mm. The data stored on the media is destroyed as a result of physical disintegration. Shredding and other physical destruction methods are not always feasible 'On-Site', i.e., on the company premises due to logistic and financial constraints. The need to ship out the storage media to an off-site shredding facility in such situations may pose a threat of data leakage due to a potential lapse in the chain of custody while the media is in transit. Also, the storage drives inventoried in a warehouse for eventual shredding are at constant risk of theft and data leakage to the point they are shredded. These plausible data-leakage threat scenarios with Shredding emerge due to a great extent of human contact and transferals in the chain of custody.
Further, Shredding destroys the storage hardware and generates toxic e-waste.
Advantages of Shredding:
Disadvantages of Shredding:
The following is a quick comparison of the overwriting (i.e., data erasure or wiping), degaussing, and shredding techniques for data destruction.
Comparison Parameter |
Overwriting |
Degaussing |
Shredding |
Process |
It is performed using data erasure software. |
A degausser unit is used, which can be a coil degausser, capacitive degausser, permanent magnet degausser. |
A shredder is used. |
Mechanism |
Overwrites the addressable memory locations on the storage media. |
Demagnetizes the magnetic storage media. |
Disintegrates the storage device. |
Devices Supported |
|
|
|
Scalability |
It is highly scalable. The software can erase thousands of drives and devices simultaneously. |
It offers limited scalability. A limited number of drives can be degaussed. |
The company can hire a vendor on contract for limited or bulk shredding needs; however, the turnaround time would be higher, considering the transit and process durations. |
Efficacy |
High – Secure & professional data erasure tool implements the overwriting technique with multiple passes and verification as per International standards like NIST 800-88 to ensure failsafe data destruction. |
Low – Successful degaussing requires a strong enough magnetic field to neutralize the magnetic media's polarity, which could pose a challenge to degauss the emerging magnetic storage. |
High – Devices, once appropriately shredded in the required dimensions, can guarantee to safeguard against the risks of data retrieval though may not be environment friendly. |
Ease-of-use and Convenience
|
Data erasure software with GUI offers an easy way to erase the drives without requiring special preparations like dismantling or removing the drive from the host machine. |
Technical expertise is required to manually operate a degausser unit available only with service providers. |
Shredding is a specialized capability available only with IT asset destruction service providers. |
Reuse / Resale Value |
Overwriting or erasure retains the residual value of the storage hardware to allow further usage or monetization. |
Renders the device unusable so no residual value. |
Destroys the device completely so no reuse possible. |
Environmental Impact |
No Impact – Does not generate any e-waste. |
Generates e-waste and hazardous to environment. |
Generates e-waste and hazardous to environment. |
Further Reading: Data Erasure vs. Degaussing
BitRaser is NIST Certified
Related Articles
![]() |
NIST Clear |
![]() |
NIST-ATA Purge |
![]() |
US Department of Defense, DoD 5220.22-M (3 passes) |
![]() |
US Department of Defense, DoD 5200.22-M (ECE) (7 passes) |
![]() |
US Department of Defense, DoD 5200.28-STD (7 passes) |
![]() |
Russian Standard – GOST-R-50739-95 (2 passes) |
![]() |
B.Schneier’s algorithm (7 passes) |
![]() |
German Standard VSITR (7 passes) |
![]() |
Peter Gutmann (35 passes) |
![]() |
US Army AR 380-19 (3 passes) |
![]() |
North Atlantic Treaty Organization-NATO Standard (7 passes) |
![]() |
US Air Force AFSSI 5020 (3 passes) |
![]() |
Pfitzner algorithm (33 passes) |
![]() |
Canadian RCMP TSSIT OPS-II (4 passes) |
![]() |
British HMG IS5 (3 passes) |
![]() |
Zeroes |
![]() |
Pseudo-random |
![]() |
Pseudo-random & Zeroes (2 passes) |
![]() |
Random Random Zero (6 passes) |
![]() |
British HMG IS5 Baseline standard |
![]() |
NAVSO P-5239-26 (3 passes) |
![]() |
NCSG-TG-025 (3 passes) |
![]() |
5 Customized Algorithms & more |
Listening...