SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Data Recovery
Aakash Mehta     Bhaumik Chaudhari
  10IT026           10IT053

     Shankersinh Vaghela Bapu
       Institute Of Technology
            Nov 22nd, 2012
Overview
   What is Data Recovery?
   Disk Structure
   Software used
   Real World Uses
   Advantages & Disadvantages
   Demo

                Shankersinh Vaghela Bapu
                 Institute Of Technology   2
What is data recovery?
   Retrieving deleted/inaccessible data from electronic
    storage media (hard drives, removable media, optical
    devices, etc...)


   Typical causes of loss include:
       Computer Virus
       Data Corruption
       Computer Crime
       Human Error


                          Shankersinh Vaghela Bapu
                           Institute Of Technology         3
Disk Structure
   A. Track

   B. Geometrical Sector

   C. Track Sector

   D. Cluster
                   Shankersinh Vaghela Bapu
                    Institute Of Technology   4
Several forms of Disk Storage


   Comparison of several
    forms of disk storage
    showing tracks.




                     Shankersinh Vaghela Bapu
                      Institute Of Technology   5
How data is Stored ?
   Data is stored into magnetic blocks which are in
    sectors.
   Every time you format HDD, new layer is
    created.
   With the increase of layers memory blocks are
    also increased and it results to variations in data
    transfer(Speed Decrease, Memory consumption
    high).

                     Shankersinh Vaghela Bapu
                      Institute Of Technology         6
How Data Is Recovered?
   At the First time Low Level Format(LLF) is
    performed on the hard disk, the disk’s platters
    start out empty. That’s the last time the platters
    will be empty for the life of the drive.
   If an LLF is done on a disk with data on it
    already, the data is permanently erased.
   The type of formatting that most users are
    familiar with is called high-level formatting and it
    is the process of setting up an empty file system.
                     Shankersinh Vaghela Bapu
                      Institute Of Technology          7
How Data Is Recovered?
   Data stored on the hard drive is not physically
    deleted during formatting.
   The hard drive is re-organized and the table with
    information where files are stored is reset.
   As long as the file system and its settings remain
    the same, none of the actual data previously
    stored on the hard drive is deleted or overwritten
    can subsequently be recovered.

                    Shankersinh Vaghela Bapu
                     Institute Of Technology         8
How Data Is Recovered?
   When Data is overwritten, the magnetic domains
    on the HDD are re-magnetized.
   This is an irreversible process that physically
    removes information previously stored in this
    location. 
   This would require the use of a Magnetic force
    microscopy (MFM) or similar technologies, to
    recover overwritten data successfully.
   There is no software or other technical way
    known to the public that can restore overwritten
    data.             Shankersinh Vaghela Bapu
                       Institute Of Technology       9
Software For Data Recovery
   Stellar Phoenix Windows Data Recovery

   Stellar phoenix Linux Data Recovery

   Get Data Back-NTFS

   Get Data Back-FAT

                   Shankersinh Vaghela Bapu
                    Institute Of Technology   10
Operating Systems
   Helix:
-   Helix is a Linux based forensics operating
    system.
-   It is combined system used to analyse the file
    system and also generates the reports.
   Encase:
-   It is also very rich utility designed for the
    professionals.
                    Shankersinh Vaghela Bapu
                     Institute Of Technology         11
Real World Uses
   Average User:
       Recover important lost files
       Keep your private information private
   Law enforcement:
       Locate illegal data
       Restore deleted/overwritten information.
       Prosecute criminals based on discovered data

                     Shankersinh Vaghela Bapu
                      Institute Of Technology     12
Advantages
   Recover important data easily by using various
    software.

   If you work for an organization than your data
    should be most important and you need to
    recover at any cost if it is lost.

   Recover your personal photo's, files and etc
    which is precious to you.
                    Shankersinh Vaghela Bapu
                     Institute Of Technology         13
Disadvantages
   There is no surety that all of the lost data can be
    recovered.




                     Shankersinh Vaghela Bapu
                      Institute Of Technology         14
Private Recovery Services
   Many private companies offer quick, secure, and
    confidential data recovery:
       Computer Disk Service http://www.compdisk.com
            20 GB from $195.00
            46 GB and up – from $895.00
       Action Front http://www.datarec.com/
            External cases - $500 to $1500
            Internal cases -$2500 to $4000 for a single hard drive
            Critical Response services start at $5,000.
       Data Recovery Services -
        http://www.datarecovery.net/
                             Shankersinh Vaghela Bapu
                              Institute Of Technology                 15
References
   "Data Recovery Solutions". R3 Data Recovery. Retrieved 13 October 2012.
    "Computer Forensics Schools and Training" . Legal-Criminal-Justice-Schools.com. Retrieved 13
    October 2012.
    Zeno, Keneth (27 September 2011).  "How Does Data Recovery Work?" . Data Recovery Box.
    Retrieved 29 February 2012.
    Secure Deletion of Data from Magnetic and Solid-State Memory , Peter Gutmann, Department of
    Computer Science, University of Auckland
    Data Remanence in Semiconductor Devices , Peter Gutmann, IBM T.J. Watson Research Center
    Feenberg, Daniel (14 May 2004). 
    "Can Intelligence Agencies Read Overwritten Data? A response to Gutmann." . National Bureau
    of Economic Research. Retrieved 21 May 2008.
   Data Removal and Erasure from Hard Disk Drives
    "Disk Wiping - One Pass is Enough" . Anti-Forensics. 17 March 2009.
    "Disk Wiping - One Pass is Enough - Part 2 (this time with screenshots)" . Anti-Forensics. 18
    March 2009.
    Wright, Dr. Craig (15 January 2009). "Overwriting Hard Drive Data" .
    "Data Recovery Possible on Securely Erased SSDs" . Retrieved 22 November 2011.
                                     Shankersinh Vaghela Bapu
                                      Institute Of Technology                                        16
QUESTIONS?




 Shankersinh Vaghela Bapu
  Institute Of Technology   17

Weitere ähnliche Inhalte

Was ist angesagt?

03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - NotesKranthi
 
Data recovery slide show
Data recovery slide showData recovery slide show
Data recovery slide showtutannandi
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - NotesKranthi
 
Memory forensics
Memory forensicsMemory forensics
Memory forensicsSunil Kumar
 
05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - NotesKranthi
 
Introduction to forensic imaging
Introduction to forensic imagingIntroduction to forensic imaging
Introduction to forensic imagingMarco Alamanni
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensicOnline
 
Operating System Forensics
Operating System ForensicsOperating System Forensics
Operating System ForensicsArunJS5
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - NotesKranthi
 
Live memory forensics
Live memory forensicsLive memory forensics
Live memory forensicsMehedi Hasan
 
L6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxL6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxBhupeshkumar Nanhe
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Anpumathews
 
Memory forensics.pptx
Memory forensics.pptxMemory forensics.pptx
Memory forensics.pptx9905234521
 

Was ist angesagt? (20)

03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - Notes
 
Data recovery slide show
Data recovery slide showData recovery slide show
Data recovery slide show
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
 
Memory Forensics
Memory ForensicsMemory Forensics
Memory Forensics
 
Data recovery
Data recoveryData recovery
Data recovery
 
Memory forensics
Memory forensicsMemory forensics
Memory forensics
 
05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes
 
Introduction to forensic imaging
Introduction to forensic imagingIntroduction to forensic imaging
Introduction to forensic imaging
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Windowsforensics
WindowsforensicsWindowsforensics
Windowsforensics
 
Module 02 ftk imager
Module 02 ftk imagerModule 02 ftk imager
Module 02 ftk imager
 
Operating System Forensics
Operating System ForensicsOperating System Forensics
Operating System Forensics
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
 
Live memory forensics
Live memory forensicsLive memory forensics
Live memory forensics
 
L6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxL6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptx
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
 
Data Acquisition
Data AcquisitionData Acquisition
Data Acquisition
 
Memory forensics.pptx
Memory forensics.pptxMemory forensics.pptx
Memory forensics.pptx
 

Andere mochten auch

Data recovery from storage device
Data recovery from storage deviceData recovery from storage device
Data recovery from storage deviceMohit Shah
 
Get familiar with data recovery process
Get familiar with data recovery processGet familiar with data recovery process
Get familiar with data recovery processemandatarecovery
 
Stellar Phoenix Windows Data Recovery v7
Stellar Phoenix Windows Data Recovery v7Stellar Phoenix Windows Data Recovery v7
Stellar Phoenix Windows Data Recovery v7Prannay Shahi
 
data recovery training course online offline INTERSOFT
data recovery training course online offline  INTERSOFT data recovery training course online offline  INTERSOFT
data recovery training course online offline INTERSOFT Abdullah Khan
 
The Future Of Computers
The Future Of ComputersThe Future Of Computers
The Future Of Computersskyhighphoto83
 
Future of Computers
Future of ComputersFuture of Computers
Future of Computersguest19ab3c
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesSpiceworks
 
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyPresentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyTehmina Gulfam
 
tablet presentation
tablet presentationtablet presentation
tablet presentationAnju K John
 
Data recovery in chennai _Hard Disk Data Recovery -Raminfotech
Data recovery in chennai _Hard Disk Data Recovery -RaminfotechData recovery in chennai _Hard Disk Data Recovery -Raminfotech
Data recovery in chennai _Hard Disk Data Recovery -RaminfotechData Recovery
 
Tablet pc will be the future of computer
Tablet pc will be the future of computerTablet pc will be the future of computer
Tablet pc will be the future of computershafia Nadeem
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Andere mochten auch (14)

Data recovery from storage device
Data recovery from storage deviceData recovery from storage device
Data recovery from storage device
 
Harris Bdr
Harris BdrHarris Bdr
Harris Bdr
 
Get familiar with data recovery process
Get familiar with data recovery processGet familiar with data recovery process
Get familiar with data recovery process
 
Stellar Phoenix Windows Data Recovery v7
Stellar Phoenix Windows Data Recovery v7Stellar Phoenix Windows Data Recovery v7
Stellar Phoenix Windows Data Recovery v7
 
data recovery training course online offline INTERSOFT
data recovery training course online offline  INTERSOFT data recovery training course online offline  INTERSOFT
data recovery training course online offline INTERSOFT
 
Tablet PC
Tablet PCTablet PC
Tablet PC
 
The Future Of Computers
The Future Of ComputersThe Future Of Computers
The Future Of Computers
 
Future of Computers
Future of ComputersFuture of Computers
Future of Computers
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup Strategies
 
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyPresentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy
 
tablet presentation
tablet presentationtablet presentation
tablet presentation
 
Data recovery in chennai _Hard Disk Data Recovery -Raminfotech
Data recovery in chennai _Hard Disk Data Recovery -RaminfotechData recovery in chennai _Hard Disk Data Recovery -Raminfotech
Data recovery in chennai _Hard Disk Data Recovery -Raminfotech
 
Tablet pc will be the future of computer
Tablet pc will be the future of computerTablet pc will be the future of computer
Tablet pc will be the future of computer
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Ähnlich wie Data recovery

ResearchPaperITDF2435
ResearchPaperITDF2435ResearchPaperITDF2435
ResearchPaperITDF2435Manuel Garza
 
The Importance Of Computer System Backup Today
The Importance Of Computer System Backup TodayThe Importance Of Computer System Backup Today
The Importance Of Computer System Backup TodayDaniel Nilles
 
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...An Analyzing of different Techniques and Tools to Recover Data from Volatile ...
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...ijsrd.com
 
Data Recovered Archives
Data Recovered ArchivesData Recovered Archives
Data Recovered Archiveseldige19g0
 
computer forensics
computer forensicscomputer forensics
computer forensicsAkhil Kumar
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic InvestigatorAgape Inc
 
Next-generation sequencing: Data mangement
Next-generation sequencing: Data mangementNext-generation sequencing: Data mangement
Next-generation sequencing: Data mangementGuy Coates
 
Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryCscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryAlireza Ghahrood
 
m+storeMemory storage
m+storeMemory storagem+storeMemory storage
m+storeMemory storageOwen Funnell
 
Data Storage in DNA Documentation
Data Storage in DNA Documentation Data Storage in DNA Documentation
Data Storage in DNA Documentation Aditya Nag
 

Ähnlich wie Data recovery (20)

F1805023942
F1805023942F1805023942
F1805023942
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
ResearchPaperITDF2435
ResearchPaperITDF2435ResearchPaperITDF2435
ResearchPaperITDF2435
 
3170725_Unit-4.pptx
3170725_Unit-4.pptx3170725_Unit-4.pptx
3170725_Unit-4.pptx
 
The Importance Of Computer System Backup Today
The Importance Of Computer System Backup TodayThe Importance Of Computer System Backup Today
The Importance Of Computer System Backup Today
 
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...An Analyzing of different Techniques and Tools to Recover Data from Volatile ...
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...
 
CSE4004_Module4_1.pptx
CSE4004_Module4_1.pptxCSE4004_Module4_1.pptx
CSE4004_Module4_1.pptx
 
Latest presentation
Latest presentationLatest presentation
Latest presentation
 
Fs Ch 18
Fs Ch 18Fs Ch 18
Fs Ch 18
 
CSE4004_Module2_1.pptx
CSE4004_Module2_1.pptxCSE4004_Module2_1.pptx
CSE4004_Module2_1.pptx
 
Data Recovered Archives
Data Recovered ArchivesData Recovered Archives
Data Recovered Archives
 
test
testtest
test
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
 
Next-generation sequencing: Data mangement
Next-generation sequencing: Data mangementNext-generation sequencing: Data mangement
Next-generation sequencing: Data mangement
 
Linux Recovery
Linux RecoveryLinux Recovery
Linux Recovery
 
Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryCscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recovery
 
data recovery-raid
data recovery-raiddata recovery-raid
data recovery-raid
 
m+storeMemory storage
m+storeMemory storagem+storeMemory storage
m+storeMemory storage
 
Data Storage in DNA Documentation
Data Storage in DNA Documentation Data Storage in DNA Documentation
Data Storage in DNA Documentation
 

Kürzlich hochgeladen

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Data recovery

  • 1. Data Recovery Aakash Mehta Bhaumik Chaudhari 10IT026 10IT053 Shankersinh Vaghela Bapu Institute Of Technology Nov 22nd, 2012
  • 2. Overview  What is Data Recovery?  Disk Structure  Software used  Real World Uses  Advantages & Disadvantages  Demo Shankersinh Vaghela Bapu Institute Of Technology 2
  • 3. What is data recovery?  Retrieving deleted/inaccessible data from electronic storage media (hard drives, removable media, optical devices, etc...)  Typical causes of loss include:  Computer Virus  Data Corruption  Computer Crime  Human Error Shankersinh Vaghela Bapu Institute Of Technology 3
  • 4. Disk Structure  A. Track  B. Geometrical Sector  C. Track Sector  D. Cluster Shankersinh Vaghela Bapu Institute Of Technology 4
  • 5. Several forms of Disk Storage  Comparison of several forms of disk storage showing tracks. Shankersinh Vaghela Bapu Institute Of Technology 5
  • 6. How data is Stored ?  Data is stored into magnetic blocks which are in sectors.  Every time you format HDD, new layer is created.  With the increase of layers memory blocks are also increased and it results to variations in data transfer(Speed Decrease, Memory consumption high). Shankersinh Vaghela Bapu Institute Of Technology 6
  • 7. How Data Is Recovered?  At the First time Low Level Format(LLF) is performed on the hard disk, the disk’s platters start out empty. That’s the last time the platters will be empty for the life of the drive.  If an LLF is done on a disk with data on it already, the data is permanently erased.  The type of formatting that most users are familiar with is called high-level formatting and it is the process of setting up an empty file system. Shankersinh Vaghela Bapu Institute Of Technology 7
  • 8. How Data Is Recovered?  Data stored on the hard drive is not physically deleted during formatting.  The hard drive is re-organized and the table with information where files are stored is reset.  As long as the file system and its settings remain the same, none of the actual data previously stored on the hard drive is deleted or overwritten can subsequently be recovered. Shankersinh Vaghela Bapu Institute Of Technology 8
  • 9. How Data Is Recovered?  When Data is overwritten, the magnetic domains on the HDD are re-magnetized.  This is an irreversible process that physically removes information previously stored in this location.   This would require the use of a Magnetic force microscopy (MFM) or similar technologies, to recover overwritten data successfully.  There is no software or other technical way known to the public that can restore overwritten data. Shankersinh Vaghela Bapu Institute Of Technology 9
  • 10. Software For Data Recovery  Stellar Phoenix Windows Data Recovery  Stellar phoenix Linux Data Recovery  Get Data Back-NTFS  Get Data Back-FAT Shankersinh Vaghela Bapu Institute Of Technology 10
  • 11. Operating Systems  Helix: - Helix is a Linux based forensics operating system. - It is combined system used to analyse the file system and also generates the reports.  Encase: - It is also very rich utility designed for the professionals. Shankersinh Vaghela Bapu Institute Of Technology 11
  • 12. Real World Uses  Average User:  Recover important lost files  Keep your private information private  Law enforcement:  Locate illegal data  Restore deleted/overwritten information.  Prosecute criminals based on discovered data Shankersinh Vaghela Bapu Institute Of Technology 12
  • 13. Advantages  Recover important data easily by using various software.  If you work for an organization than your data should be most important and you need to recover at any cost if it is lost.  Recover your personal photo's, files and etc which is precious to you. Shankersinh Vaghela Bapu Institute Of Technology 13
  • 14. Disadvantages  There is no surety that all of the lost data can be recovered. Shankersinh Vaghela Bapu Institute Of Technology 14
  • 15. Private Recovery Services  Many private companies offer quick, secure, and confidential data recovery:  Computer Disk Service http://www.compdisk.com  20 GB from $195.00  46 GB and up – from $895.00  Action Front http://www.datarec.com/  External cases - $500 to $1500  Internal cases -$2500 to $4000 for a single hard drive  Critical Response services start at $5,000.  Data Recovery Services - http://www.datarecovery.net/ Shankersinh Vaghela Bapu Institute Of Technology 15
  • 16. References  "Data Recovery Solutions". R3 Data Recovery. Retrieved 13 October 2012.   "Computer Forensics Schools and Training" . Legal-Criminal-Justice-Schools.com. Retrieved 13 October 2012.   Zeno, Keneth (27 September 2011).  "How Does Data Recovery Work?" . Data Recovery Box. Retrieved 29 February 2012.   Secure Deletion of Data from Magnetic and Solid-State Memory , Peter Gutmann, Department of Computer Science, University of Auckland   Data Remanence in Semiconductor Devices , Peter Gutmann, IBM T.J. Watson Research Center   Feenberg, Daniel (14 May 2004).  "Can Intelligence Agencies Read Overwritten Data? A response to Gutmann." . National Bureau of Economic Research. Retrieved 21 May 2008.  Data Removal and Erasure from Hard Disk Drives   "Disk Wiping - One Pass is Enough" . Anti-Forensics. 17 March 2009.   "Disk Wiping - One Pass is Enough - Part 2 (this time with screenshots)" . Anti-Forensics. 18 March 2009.   Wright, Dr. Craig (15 January 2009). "Overwriting Hard Drive Data" .   "Data Recovery Possible on Securely Erased SSDs" . Retrieved 22 November 2011. Shankersinh Vaghela Bapu Institute Of Technology 16
  • 17. QUESTIONS? Shankersinh Vaghela Bapu Institute Of Technology 17