SlideShare a Scribd company logo
1 of 15
UnderstandingUnderstanding
Data RecoveryData Recovery
OverviewOverview
 What is Data Recovery?What is Data Recovery?
 How can it be used?How can it be used?
 TechniquesTechniques
 Recovery MethodsRecovery Methods
 Secure DeletionSecure Deletion
 Private vs. Government servicesPrivate vs. Government services
 Software vs. Hardware SolutionsSoftware vs. Hardware Solutions
 What can you do?What can you do?
What is data recovery?What is data recovery?
 Retrieving deleted/inaccessible data from electronicRetrieving deleted/inaccessible data from electronic
storage media (hard drives, removable media, opticalstorage media (hard drives, removable media, optical
devices, etc...)devices, etc...)
 Typical causes of loss include:Typical causes of loss include:
 Electro-mechanical FailureElectro-mechanical Failure
 Natural DisasterNatural Disaster
 Computer VirusComputer Virus
 Data CorruptionData Corruption
 Computer CrimeComputer Crime
 Human ErrorHuman Error
 ExampleExample
 How to avoid data loss on Android phone and How to retrieve lostHow to avoid data loss on Android phone and How to retrieve lost
Android dataAndroid data
Uses of data recoveryUses of data recovery
 Average User:Average User:
 Recover important lost filesRecover important lost files
 Keep your private information privateKeep your private information private
 Law enforcement:Law enforcement:
 Locate illegal dataLocate illegal data
 Restore deleted/overwritten information.Restore deleted/overwritten information.
 Prosecute criminals based on discovered dataProsecute criminals based on discovered data
Software Recovery of dataSoftware Recovery of data
 Generally only restore data not yetGenerally only restore data not yet
overwritten.overwritten.
 Do not work on physically damaged drivesDo not work on physically damaged drives
 Prices range from Free-1000Prices range from Free-1000
 http://www.hdatarecovery.com/data-recovery-software-http://www.hdatarecovery.com/data-recovery-software-
download/download/
Recovery MethodsRecovery Methods
 Hidden filesHidden files
 Recycle binRecycle bin
 Unerase wizardsUnerase wizards
 Assorted commercial programsAssorted commercial programs
 FerrofluidFerrofluid
 Coat surface of diskCoat surface of disk
 Check with optical microscopeCheck with optical microscope
 Does not work for more recent hard drivesDoes not work for more recent hard drives
 More recently…More recently…
How to Avoid Data RecoveryHow to Avoid Data Recovery
 Companies, agencies, or individuals mayCompanies, agencies, or individuals may
want to ensure their data cannot bewant to ensure their data cannot be
recovered.recovered.
 Simple deletion is not good enough.Simple deletion is not good enough.
 Faced with techniques such as MFM, trulyFaced with techniques such as MFM, truly
deleting data from magnetic media is verydeleting data from magnetic media is very
difficultdifficult
Secure Deletion: GovernmentSecure Deletion: Government
StandardsStandards
 Department of Justice:Department of Justice:
 DoD 5220.22-M – Type 1 degausser, followed by typeDoD 5220.22-M – Type 1 degausser, followed by type
2 degausser, then three data overwrites (character,2 degausser, then three data overwrites (character,
its complement, random)its complement, random)
 Problems with government standardsProblems with government standards
 Often old and predate newer techniques for bothOften old and predate newer techniques for both
recording and recovering data.recording and recovering data.
 Predate higher recording densities of modern drives,Predate higher recording densities of modern drives,
the adoption of sophisticated channel codingthe adoption of sophisticated channel coding
techniques, and the use of MFM.techniques, and the use of MFM.
 Government standard may in fact be understated toGovernment standard may in fact be understated to
fool opposing intelligence agencies.fool opposing intelligence agencies.
Secure Deletion TechniquesSecure Deletion Techniques
 DegaussingDegaussing
 Process in which the media is returned to its initial stateProcess in which the media is returned to its initial state
 Coercivity – Amount of magnetic field necessary to reduce theCoercivity – Amount of magnetic field necessary to reduce the
magnetic induction to zero. (measured in Oersteds)magnetic induction to zero. (measured in Oersteds)
 Effectively erasing a medium to the extent that data recovery isEffectively erasing a medium to the extent that data recovery is
uneconomical requires a magnetic force ~5x the coercivity.uneconomical requires a magnetic force ~5x the coercivity.
 US Government guidelines on media coercivity:US Government guidelines on media coercivity:
 Class 1: 350 Oe coercivity or lessClass 1: 350 Oe coercivity or less
 Class 2: 350-750 Oe coercivity.Class 2: 350-750 Oe coercivity.
 Class 3: over 750 Oe coercivityClass 3: over 750 Oe coercivity
 Degaussers are available for classes 1 and 2. None known forDegaussers are available for classes 1 and 2. None known for
fullyfully degaussing class 3 media.degaussing class 3 media.
Deletion TechniquesDeletion Techniques
 Technique 2: Multiple OverwritesTechnique 2: Multiple Overwrites
 Use an overwrite schemeUse an overwrite scheme
 Flip each magnetic domain on the disk back and forthFlip each magnetic domain on the disk back and forth
as much as possibleas much as possible
 Overwrite in alternating patterns to expose it to anOverwrite in alternating patterns to expose it to an
oscillating magnetic field.oscillating magnetic field.
 Overwrite with “junk” data several timesOverwrite with “junk” data several times
 Use the lowest frequency possible for overwritesUse the lowest frequency possible for overwrites
 Penetrates deeper into the recording mediumPenetrates deeper into the recording medium
Deletion TechniquesDeletion Techniques
 Peter Guttman’s overwrite scheme:Peter Guttman’s overwrite scheme:
 Meant to defeat all possible recoveryMeant to defeat all possible recovery
techniques (MFM, etc)techniques (MFM, etc)
 Specifies 35 different overwritesSpecifies 35 different overwrites
 Not all overwrites are needed if targetingNot all overwrites are needed if targeting
specific recovery method (i.e. MFM)specific recovery method (i.e. MFM)
Overwrite Data
Pass No. Data Written Encoding Scheme Targeted
1 - 4 Random
5 01010101 01010101 01010101 0x55 (1,7)RLL MFM
6 10101010 10101010 10101010 0xAA (1,7)RLL MFM
7 10010010 01001001 00100100 0x92 0x49 0x24 (2,7)RLL MFM
8 01001001 00100100 10010010 0x49 0x24 0x92 (2,7)RLL MFM
9 00100100 10010010 01001001 0x24 0x92 0x49 (2,7)RLL MFM
10 00000000 00000000 00000000 0x00 (1,7)RLL (2,7)RLL
11 00010001 00010001 00010001 0x11 (1,7)RLL
12 00100010 00100010 00100010 0x22 (1,7)RLL
13 00110011 00110011 00110011 0x33 (1,7)RLL (2,7)RLL
14 01000100 01000100 01000100 0x44 (1,7)RLL
15 01010101 01010101 01010101 0x55 (1,7)RLL MFM
16 01100110 01100110 01100110 0x66 (1,7)RLL (2,7)RLL
17 01110111 01110111 01110111 0x77 (1,7)RLL
18 10001000 10001000 10001000 0x88 (1,7)RLL
19 10011001 10011001 10011001 0x99 (1,7)RLL (2,7)RLL
20 10101010 10101010 10101010 0xAA (1,7)RLL MFM
21 10111011 10111011 10111011 0xBB (1,7)RLL
22 11001100 11001100 11001100 0xCC (1,7)RLL (2,7)RLL
23 11011101 11011101 11011101 0xDD (1,7)RLL
24 11101110 11101110 11101110 0xEE (1,7)RLL
25 11111111 11111111 11111111 0xFF (1,7)RLL (2,7)RLL
26 10010010 01001001 00100100 0x92 0x49 0x24 (2,7)RLL MFM
27 01001001 00100100 10010010 0x49 0x24 0x92 (2,7)RLL MFM
28 00100100 10010010 01001001 0x24 0x92 0x49 (2,7)RLL MFM
29 01101101 10110110 11011011 0x6D 0xB6 0xDB (2,7)RLL
30 10110110 11011011 01101101 0xB6 0xDB 0x6D (2,7)RLL
31 11011011 01101101 10110110 0xDB 0x6D 0xB6 (2,7)RLL
32-35 Random
Deletion TechniquesDeletion Techniques
 Extremely Extreme Physical DestructionExtremely Extreme Physical Destruction
 ChainsawsChainsaws
 Sledge hammersSledge hammers
 Drop in a volcanoDrop in a volcano
 Place on apex of a nuclear warheadPlace on apex of a nuclear warhead
 Multiple rounds from a high caliber firearmMultiple rounds from a high caliber firearm
 Hard Drivers are tougher than you thinkHard Drivers are tougher than you think
What can you do?What can you do?
To reliably remove files?To reliably remove files?
 Not Much - absolutely secure is veryNot Much - absolutely secure is very
difficult given methods out todaydifficult given methods out today
 Make it impractical or extremely expensiveMake it impractical or extremely expensive
to recoverto recover
QUESTIONS?QUESTIONS?

More Related Content

Similar to Get your Lost Data Back Now - Understanding Data Recovery

Data recovery system
Data recovery systemData recovery system
Data recovery systemkaranbhale
 
02 fault tolerance
02 fault tolerance02 fault tolerance
02 fault toleranceashish61_scs
 
Data recovery slide show
Data recovery slide showData recovery slide show
Data recovery slide showtutannandi
 
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...Felipe Prado
 
Anti-Tampering_Part1.pdf
Anti-Tampering_Part1.pdfAnti-Tampering_Part1.pdf
Anti-Tampering_Part1.pdfshannlevia123
 
Normal accidents and outpatient surgeries
Normal accidents and outpatient surgeriesNormal accidents and outpatient surgeries
Normal accidents and outpatient surgeriesJonathan Creasy
 
An Introduction to Asset Recovery
An Introduction to Asset RecoveryAn Introduction to Asset Recovery
An Introduction to Asset Recoverymylespilkington
 
Data recovery
Data recoveryData recovery
Data recoverygupta8741
 
Cmo Research Paper
Cmo Research PaperCmo Research Paper
Cmo Research PaperNicole Gomez
 
INTRODUCTION OF A NOVEL ANOMALOUS SOUND DETECTION METHODOLOGY
INTRODUCTION OF A NOVEL ANOMALOUS SOUND DETECTION METHODOLOGYINTRODUCTION OF A NOVEL ANOMALOUS SOUND DETECTION METHODOLOGY
INTRODUCTION OF A NOVEL ANOMALOUS SOUND DETECTION METHODOLOGYIJCI JOURNAL
 
INTRODUCTION OF A NOVEL ANOMALOUS SOUND DETECTION METHODOLOGY
INTRODUCTION OF A NOVEL ANOMALOUS SOUND DETECTION METHODOLOGYINTRODUCTION OF A NOVEL ANOMALOUS SOUND DETECTION METHODOLOGY
INTRODUCTION OF A NOVEL ANOMALOUS SOUND DETECTION METHODOLOGYijsc
 
Defending a decentralized grid: Talking an energy revolution from OMNETRIC
Defending a decentralized grid: Talking an energy revolution from OMNETRICDefending a decentralized grid: Talking an energy revolution from OMNETRIC
Defending a decentralized grid: Talking an energy revolution from OMNETRICOMNETRIC
 
AktaionPPTv5_JZedits
AktaionPPTv5_JZeditsAktaionPPTv5_JZedits
AktaionPPTv5_JZeditsRod Soto
 

Similar to Get your Lost Data Back Now - Understanding Data Recovery (20)

Data recovery
Data recoveryData recovery
Data recovery
 
Data recovery system
Data recovery systemData recovery system
Data recovery system
 
Data recovery
Data recoveryData recovery
Data recovery
 
02 fault tolerance
02 fault tolerance02 fault tolerance
02 fault tolerance
 
Data recovery slide show
Data recovery slide showData recovery slide show
Data recovery slide show
 
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
 
Data recovery
Data recoveryData recovery
Data recovery
 
Anti-Tampering_Part1.pdf
Anti-Tampering_Part1.pdfAnti-Tampering_Part1.pdf
Anti-Tampering_Part1.pdf
 
2014_sem_pocket_guide
2014_sem_pocket_guide2014_sem_pocket_guide
2014_sem_pocket_guide
 
Normal accidents and outpatient surgeries
Normal accidents and outpatient surgeriesNormal accidents and outpatient surgeries
Normal accidents and outpatient surgeries
 
An Introduction to Asset Recovery
An Introduction to Asset RecoveryAn Introduction to Asset Recovery
An Introduction to Asset Recovery
 
Data recovery
Data recoveryData recovery
Data recovery
 
Cmo Research Paper
Cmo Research PaperCmo Research Paper
Cmo Research Paper
 
INTRODUCTION OF A NOVEL ANOMALOUS SOUND DETECTION METHODOLOGY
INTRODUCTION OF A NOVEL ANOMALOUS SOUND DETECTION METHODOLOGYINTRODUCTION OF A NOVEL ANOMALOUS SOUND DETECTION METHODOLOGY
INTRODUCTION OF A NOVEL ANOMALOUS SOUND DETECTION METHODOLOGY
 
INTRODUCTION OF A NOVEL ANOMALOUS SOUND DETECTION METHODOLOGY
INTRODUCTION OF A NOVEL ANOMALOUS SOUND DETECTION METHODOLOGYINTRODUCTION OF A NOVEL ANOMALOUS SOUND DETECTION METHODOLOGY
INTRODUCTION OF A NOVEL ANOMALOUS SOUND DETECTION METHODOLOGY
 
Defending a decentralized grid: Talking an energy revolution from OMNETRIC
Defending a decentralized grid: Talking an energy revolution from OMNETRICDefending a decentralized grid: Talking an energy revolution from OMNETRIC
Defending a decentralized grid: Talking an energy revolution from OMNETRIC
 
2008- Prenatal diagnosis
2008- Prenatal diagnosis2008- Prenatal diagnosis
2008- Prenatal diagnosis
 
Microprocessor Systems
Microprocessor Systems Microprocessor Systems
Microprocessor Systems
 
BCM App brief
BCM App briefBCM App brief
BCM App brief
 
AktaionPPTv5_JZedits
AktaionPPTv5_JZeditsAktaionPPTv5_JZedits
AktaionPPTv5_JZedits
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

Get your Lost Data Back Now - Understanding Data Recovery

  • 2. OverviewOverview  What is Data Recovery?What is Data Recovery?  How can it be used?How can it be used?  TechniquesTechniques  Recovery MethodsRecovery Methods  Secure DeletionSecure Deletion  Private vs. Government servicesPrivate vs. Government services  Software vs. Hardware SolutionsSoftware vs. Hardware Solutions  What can you do?What can you do?
  • 3. What is data recovery?What is data recovery?  Retrieving deleted/inaccessible data from electronicRetrieving deleted/inaccessible data from electronic storage media (hard drives, removable media, opticalstorage media (hard drives, removable media, optical devices, etc...)devices, etc...)  Typical causes of loss include:Typical causes of loss include:  Electro-mechanical FailureElectro-mechanical Failure  Natural DisasterNatural Disaster  Computer VirusComputer Virus  Data CorruptionData Corruption  Computer CrimeComputer Crime  Human ErrorHuman Error  ExampleExample  How to avoid data loss on Android phone and How to retrieve lostHow to avoid data loss on Android phone and How to retrieve lost Android dataAndroid data
  • 4. Uses of data recoveryUses of data recovery  Average User:Average User:  Recover important lost filesRecover important lost files  Keep your private information privateKeep your private information private  Law enforcement:Law enforcement:  Locate illegal dataLocate illegal data  Restore deleted/overwritten information.Restore deleted/overwritten information.  Prosecute criminals based on discovered dataProsecute criminals based on discovered data
  • 5. Software Recovery of dataSoftware Recovery of data  Generally only restore data not yetGenerally only restore data not yet overwritten.overwritten.  Do not work on physically damaged drivesDo not work on physically damaged drives  Prices range from Free-1000Prices range from Free-1000  http://www.hdatarecovery.com/data-recovery-software-http://www.hdatarecovery.com/data-recovery-software- download/download/
  • 6. Recovery MethodsRecovery Methods  Hidden filesHidden files  Recycle binRecycle bin  Unerase wizardsUnerase wizards  Assorted commercial programsAssorted commercial programs  FerrofluidFerrofluid  Coat surface of diskCoat surface of disk  Check with optical microscopeCheck with optical microscope  Does not work for more recent hard drivesDoes not work for more recent hard drives  More recently…More recently…
  • 7. How to Avoid Data RecoveryHow to Avoid Data Recovery  Companies, agencies, or individuals mayCompanies, agencies, or individuals may want to ensure their data cannot bewant to ensure their data cannot be recovered.recovered.  Simple deletion is not good enough.Simple deletion is not good enough.  Faced with techniques such as MFM, trulyFaced with techniques such as MFM, truly deleting data from magnetic media is verydeleting data from magnetic media is very difficultdifficult
  • 8. Secure Deletion: GovernmentSecure Deletion: Government StandardsStandards  Department of Justice:Department of Justice:  DoD 5220.22-M – Type 1 degausser, followed by typeDoD 5220.22-M – Type 1 degausser, followed by type 2 degausser, then three data overwrites (character,2 degausser, then three data overwrites (character, its complement, random)its complement, random)  Problems with government standardsProblems with government standards  Often old and predate newer techniques for bothOften old and predate newer techniques for both recording and recovering data.recording and recovering data.  Predate higher recording densities of modern drives,Predate higher recording densities of modern drives, the adoption of sophisticated channel codingthe adoption of sophisticated channel coding techniques, and the use of MFM.techniques, and the use of MFM.  Government standard may in fact be understated toGovernment standard may in fact be understated to fool opposing intelligence agencies.fool opposing intelligence agencies.
  • 9. Secure Deletion TechniquesSecure Deletion Techniques  DegaussingDegaussing  Process in which the media is returned to its initial stateProcess in which the media is returned to its initial state  Coercivity – Amount of magnetic field necessary to reduce theCoercivity – Amount of magnetic field necessary to reduce the magnetic induction to zero. (measured in Oersteds)magnetic induction to zero. (measured in Oersteds)  Effectively erasing a medium to the extent that data recovery isEffectively erasing a medium to the extent that data recovery is uneconomical requires a magnetic force ~5x the coercivity.uneconomical requires a magnetic force ~5x the coercivity.  US Government guidelines on media coercivity:US Government guidelines on media coercivity:  Class 1: 350 Oe coercivity or lessClass 1: 350 Oe coercivity or less  Class 2: 350-750 Oe coercivity.Class 2: 350-750 Oe coercivity.  Class 3: over 750 Oe coercivityClass 3: over 750 Oe coercivity  Degaussers are available for classes 1 and 2. None known forDegaussers are available for classes 1 and 2. None known for fullyfully degaussing class 3 media.degaussing class 3 media.
  • 10. Deletion TechniquesDeletion Techniques  Technique 2: Multiple OverwritesTechnique 2: Multiple Overwrites  Use an overwrite schemeUse an overwrite scheme  Flip each magnetic domain on the disk back and forthFlip each magnetic domain on the disk back and forth as much as possibleas much as possible  Overwrite in alternating patterns to expose it to anOverwrite in alternating patterns to expose it to an oscillating magnetic field.oscillating magnetic field.  Overwrite with “junk” data several timesOverwrite with “junk” data several times  Use the lowest frequency possible for overwritesUse the lowest frequency possible for overwrites  Penetrates deeper into the recording mediumPenetrates deeper into the recording medium
  • 11. Deletion TechniquesDeletion Techniques  Peter Guttman’s overwrite scheme:Peter Guttman’s overwrite scheme:  Meant to defeat all possible recoveryMeant to defeat all possible recovery techniques (MFM, etc)techniques (MFM, etc)  Specifies 35 different overwritesSpecifies 35 different overwrites  Not all overwrites are needed if targetingNot all overwrites are needed if targeting specific recovery method (i.e. MFM)specific recovery method (i.e. MFM)
  • 12. Overwrite Data Pass No. Data Written Encoding Scheme Targeted 1 - 4 Random 5 01010101 01010101 01010101 0x55 (1,7)RLL MFM 6 10101010 10101010 10101010 0xAA (1,7)RLL MFM 7 10010010 01001001 00100100 0x92 0x49 0x24 (2,7)RLL MFM 8 01001001 00100100 10010010 0x49 0x24 0x92 (2,7)RLL MFM 9 00100100 10010010 01001001 0x24 0x92 0x49 (2,7)RLL MFM 10 00000000 00000000 00000000 0x00 (1,7)RLL (2,7)RLL 11 00010001 00010001 00010001 0x11 (1,7)RLL 12 00100010 00100010 00100010 0x22 (1,7)RLL 13 00110011 00110011 00110011 0x33 (1,7)RLL (2,7)RLL 14 01000100 01000100 01000100 0x44 (1,7)RLL 15 01010101 01010101 01010101 0x55 (1,7)RLL MFM 16 01100110 01100110 01100110 0x66 (1,7)RLL (2,7)RLL 17 01110111 01110111 01110111 0x77 (1,7)RLL 18 10001000 10001000 10001000 0x88 (1,7)RLL 19 10011001 10011001 10011001 0x99 (1,7)RLL (2,7)RLL 20 10101010 10101010 10101010 0xAA (1,7)RLL MFM 21 10111011 10111011 10111011 0xBB (1,7)RLL 22 11001100 11001100 11001100 0xCC (1,7)RLL (2,7)RLL 23 11011101 11011101 11011101 0xDD (1,7)RLL 24 11101110 11101110 11101110 0xEE (1,7)RLL 25 11111111 11111111 11111111 0xFF (1,7)RLL (2,7)RLL 26 10010010 01001001 00100100 0x92 0x49 0x24 (2,7)RLL MFM 27 01001001 00100100 10010010 0x49 0x24 0x92 (2,7)RLL MFM 28 00100100 10010010 01001001 0x24 0x92 0x49 (2,7)RLL MFM 29 01101101 10110110 11011011 0x6D 0xB6 0xDB (2,7)RLL 30 10110110 11011011 01101101 0xB6 0xDB 0x6D (2,7)RLL 31 11011011 01101101 10110110 0xDB 0x6D 0xB6 (2,7)RLL 32-35 Random
  • 13. Deletion TechniquesDeletion Techniques  Extremely Extreme Physical DestructionExtremely Extreme Physical Destruction  ChainsawsChainsaws  Sledge hammersSledge hammers  Drop in a volcanoDrop in a volcano  Place on apex of a nuclear warheadPlace on apex of a nuclear warhead  Multiple rounds from a high caliber firearmMultiple rounds from a high caliber firearm  Hard Drivers are tougher than you thinkHard Drivers are tougher than you think
  • 14. What can you do?What can you do? To reliably remove files?To reliably remove files?  Not Much - absolutely secure is veryNot Much - absolutely secure is very difficult given methods out todaydifficult given methods out today  Make it impractical or extremely expensiveMake it impractical or extremely expensive to recoverto recover