O. Semenenko, Y. Dobrovolsky, V. Koverga, O. Sechenev


Evolution of security technologies shows that only the concept of an integrated approach to information security can provide modern information security requirements. A comprehensive approach means the complex development of all the necessary methods and means of information protection. Today, the information exchange and information systems in the Ministry of Defense of Ukraine have certain means and approaches to the destruction of information, but each of them has different estimates of the effectiveness of their use, as well as the different cost of their purchase and use. Therefore, the main purpose of the article is to carry out a comprehensive analysis of means of destroying confidential information of methods of its destruction to formulate practical recommendations for choosing the most effective and economically feasible for the Ministry of Defense of Ukraine.

The perfection of methods and means of destroying information from magnetic media is an important element of modern information security. The results of the analysis carried out in the article are the disclosure of the main features of modern devices for the elimination of magnetic records, as well as the ability to formulate a list of basic requirements for modern devices for the destruction of information from magnetic media.

Today, technical means of information security, in particular, the elimination of information on magnetic media, are constantly being improved, absorbing the latest advances in modern security technologies. Their model range, which takes into account the diversity of customer requirements, such as the type of energy supply, the level of mobility, reliability and operating conditions, expands. All this determines the relevance of research topics in this direction in the future.


Information security; destruction of information; the effectiveness of the destruction of information; magnetic storage media; a magnetic field; HDD; RAM.


PDF (українська)


Hansen F., Oleshchuk V. Conformance Checking of RBAC Policy and its Implementation, The First Information Security Practice and Experience Conference. ISPEC2005, Singapore, LNCS, Volume 3439, 2005. 144–155 p.

Mueller S. Upgrading and Repairing PCs, 13th Edition. Indianapolis: Que. 2002.

Industrial Security Manual for Safeguarding Classified Information. Department of Defense Manual, DoD 5220.22-M. 1987.

Levy S.V., Ostrovski A.S., Agalidi Ju.S. Magnetic field topographical survey by magnetooptical spatial-time light modulators. SPIE Proceedings, 1993. 142–146 p.

Menezes A.J., Oorschot P.C., Vanstone S.A. Handbook of applied cryptography. N.Y .: CRC Press, 1996. 780p.

Mueller S. Upgrading and Repairing PCs, 13th Edition. Indianapolis: Que, 2002. 1556 p.

Anthology: Information security of the office. Technical means of protection of information. Issue 1. Kyiv: TI "DS". 2003.

VS Barsukov To save information, it must be destroyed! .Special equipment. 2001. № 6.

Besedin DI, Boborikin SN, Ryzhikov SS Preventing the leakage of information stored in hard disk drives. Special equipment. 2001. № 1.

Rokhmanyuk VM, Fokin EM Equipment for emergency destruction of records on magnetic media. BDI. 2009. № 5.

Rokhmanyuk VM, Fokin EM Winchester shredder. PC WEEK / RE. 2000. № 39.

Barsukov VS Modern security technologies. M .: Nolidge, 2000.

Boborikin SN Evaluation of the effectiveness of the destruction of information stored in hard disk drives. Spec. technique.  2001.  № 3.

Gordienko I. Destruction of data. Practical approach:  (accessed May 13, 2019).

Copyright 2014 O. Semenenko. Розроблено ІОЦ ВА
Templates Joomla 1.7 by Wordpress themes free