Browse Definitions :

BACKGROUND IMAGE: iSTOCK/GETTY IMAGES

This content is part of the Essential Guide: Mobile endpoint security: What enterprise infosec pros must know now
Definition

wipe

Contributor(s): Ivy Wigmore

Wipe, in a computing context, means to render all data on a hard drive  unreadable. The term is often used in reference to making data stored on a computer, smartphone or tablet inaccessible before disposing of the device.

Although "erase" is often used as a synonym for "wipe," that term is a little misleading -- it isn't possible to actually erase hard drive data. Deleting a file only removes the file listing, which serves as a shortcut. The data is still on the computer and easily accessible to anyone with the right program and/or know-how. The same is true if you reformat a drive.

The most common method of wiping a computer's data is to use a hard drive overwriter product, such as Darik's Boot and Nuke. The more times data is overwritten, the more unreadable it becomes. The most thorough products overwrite each bit with a zero.

The question of whether overwritten data is still accessible is controversial. According to some security experts -- most notably, Peter Gutmann, author of "Secure Deletion of Data from Magnetic and Solid-State Memory" -- an individual with a great deal of expertise and motivation can still access data after a hard drive has been wiped. Some experts recommend that a hard drive should be physically destroyed to ensure that the data doesn't fall into the wrong hands. On the other hand, a NIST (National Institute of Standards and Technology) publication on the issue states that a single overwrite renders data unreadable.

There are various services and products available to physically destroy hard drives. A hard drive shredder is a mechanical device that physically destroys old hard drives so thoroughly that the data they contain cannot be recovered.

 

This was last updated in June 2012

Continue Reading About wipe

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • Transport Layer Security (TLS)

    Transport Layer Security (TLS) is a protocol that provides authentication, privacy, and data integrity between two communicating ...

  • van Eck phreaking

    Van Eck phreaking is a form of electronic eavesdropping that reverse engineers the electromagnetic fields (EM fields) produced by...

  • zero-trust model (zero trust network)

    The zero trust model is a security model used by IT professionals that requires strict identity and device verification ...

SearchHealthIT

SearchDisasterRecovery

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

SearchStorage

  • solid-state storage

    Solid-state storage (SSS) is a type of computer storage media made from silicon microchips. SSS stores data electronically ...

  • persistent storage

    Persistent storage is any data storage device that retains data after power to that device is shut off. It is also sometimes ...

  • computational storage

    Computational storage is an information technology (IT) architecture in which data is processed at the storage device level to ...

Close