SlideShare a Scribd company logo
1 of 14
G. H. RAISONI COLLEGE OF ENGG. & MANAGEMENT
Gat No. 1200, Wagholi, Pune – 412 207
DEPARTMENT OF COMPUTER ENGINEERING
TAE:- 1
(An Autonomous Institute Affiliated to Savitribai Phule Pune University)
TOPIC : Data Recovery Techniques
Presented by :
1) Venkatesh Pensalwar (TCOB93) 2) sanket uttarwar(TCOB98)
3) Shivam Ramanvar (TCOB95) 4) Shivam Ranjwe (TCOB96)
What is Data Loss?
 Data has accidentally been erased or data
control structures have been overwritten.
 Data has been corrupted or made
inaccessible.
 Data is unable to be accessed from a previous
functioning computer system or backup.
Data Recovery
 Data recovery is a process of salvaging inaccessible data from damaged
or corrupted secondary storage , when the data store cannot be
accessed in a normal way.
 The data is most often salvaged from storage media such as internal or
external hard disk drives (HDDs), USB flash drives , solid-state drives (SSDs),
magnetic tapes, CDs, DVDs, and other electronic devices.
What Causes Data Loss?
 Natural Disaster
 Hardware Error
 Virus Attack
 Human Error
 Intentional deletion
 Accidental overwriting of files
 Software Corruption
How to Prevent Data Loss
 Don’t upgrade hardware or software without having
a backup
 Physically secure your system from intruders
 Use firewalls and virus protection
 Be prepared for physical disasters
Data Recovery Techniques
 Use of software to recover data
 Use of machines to recover data
Software or logical Data Extraction
 Data extraction is the process of moving data off of
the imaged drive to another destination location.
 Data extraction software scans sectors of the hard
drive and restructures the file system either in
memory or another hard drive.
 The software can be used to copy the recoverable
data to a destination location.
Software Recovery
 Data loss can occur because the hard drive may have
problems accessing the data it contains at a software or
logical level.
 By making an exact copy including all deleted information) of
the hard drive, using a program such as Norton GHOST, most
data recovery programs search for deleted MFT (Master File
Table) entries to undelete files.
 If the MFT is corrupt or defective, this method will not work.
Some data recovery programs will ignore the MFT and search
all of the unallocated clusters to try to find and recover files.
Physical Data Recovery
 The user may send a failed hard disk drive to a
private data recovery company that offers secure and
confidential data recovery.
 The data recovery company will carefully perform
part replacement of the heads, spindle motor and
base casting, the electronics board, etc. in a clean
room environment.
 Part replacement has historically been successful for
data recovery about 40%-60% of the time.
Data Recovery Techniques
Scanning Probe Microscopy (SPM)
 A technique that is used to image and
measure surfaces at the atomic level.
 Scans an atomically sharp probe over a
surface which produces a 3D topographic
image of the surface at the atomic scale.
Data Recovery Tips
Do’s:
•Do try to back up your important data on a daily or weekly basis
•If your hard disk is not getting detected, do use a different cable to connect the hard disk
•After data loss, remove your storage device and keep it in a safe place
•If you are unable to access your storage drive and data is lost, then immediately stop
using your drive and download a data recovery software to get them back
•Do turn off your system, when you hear any clicking / grinding noise from your hard disk
•Do install an effective antivirus program to scan and remove viruses causing data loss
from your system
Don’ts:
•Don’t make attempts to recover your lost data by yourself
•Do not store your important data on hard disk having Bad sectors
•Don’t download application programs from unknown sites
•Do not store or copy new files to your hard disk after data loss as this can overwrite
the deleted / lost files beyond the scope of recovery
•Don’t try to open your physically damaged hard disk
Do not use any third party application software to create, delete or repartition your
hard disk
https://en.wikipedia.org/wiki/Data_recovery
https://www.geeksforgeeks.org/dbms-database-recovery-
techniques/
Reference links
THANK YOU

More Related Content

What's hot

04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
Kranthi
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...
Sagar Rahurkar
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
Kranthi
 
05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes
Kranthi
 

What's hot (20)

Data recovery
Data recoveryData recovery
Data recovery
 
Data recovery with a view of digital forensics
Data recovery with a view of digital forensics Data recovery with a view of digital forensics
Data recovery with a view of digital forensics
 
Windowsforensics
WindowsforensicsWindowsforensics
Windowsforensics
 
CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationCNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic Duplication
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
 
Data recovery tools
Data recovery toolsData recovery tools
Data recovery tools
 
Data recovery
Data recoveryData recovery
Data recovery
 
Data Acquisition
Data AcquisitionData Acquisition
Data Acquisition
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
 
05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Windows forensic artifacts
Windows forensic artifactsWindows forensic artifacts
Windows forensic artifacts
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenes
 
Disk forensics
Disk forensicsDisk forensics
Disk forensics
 
Forensics Analysis and Validation
Forensics Analysis and Validation  Forensics Analysis and Validation
Forensics Analysis and Validation
 
Hard Disk Data Acquisition
Hard Disk Data AcquisitionHard Disk Data Acquisition
Hard Disk Data Acquisition
 

Similar to DATA RECOVERY TECHNIQUES

Four phases of data recovery
Four phases of data recoveryFour phases of data recovery
Four phases of data recovery
Dolphin Data Lab
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
Gnanavi2
 
Data Recovered Archives
Data Recovered ArchivesData Recovered Archives
Data Recovered Archives
eldige19g0
 
Understanding Memory in Computing part 1.pptx
Understanding Memory in Computing part 1.pptxUnderstanding Memory in Computing part 1.pptx
Understanding Memory in Computing part 1.pptx
Pravash Chandra Das
 
ResearchPaperITDF2435
ResearchPaperITDF2435ResearchPaperITDF2435
ResearchPaperITDF2435
Manuel Garza
 

Similar to DATA RECOVERY TECHNIQUES (20)

ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1
 
P3
P3P3
P3
 
F1805023942
F1805023942F1805023942
F1805023942
 
UNIT 2 P3 and d1
UNIT 2 P3 and d1UNIT 2 P3 and d1
UNIT 2 P3 and d1
 
Four phases of data recovery
Four phases of data recoveryFour phases of data recovery
Four phases of data recovery
 
Data recovery report
Data recovery reportData recovery report
Data recovery report
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
Data recovery
Data recoveryData recovery
Data recovery
 
Hard drive data recovery
Hard drive data recoveryHard drive data recovery
Hard drive data recovery
 
Fs Ch 18
Fs Ch 18Fs Ch 18
Fs Ch 18
 
How to recover data after hard drive crash
How to recover data after hard drive crashHow to recover data after hard drive crash
How to recover data after hard drive crash
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
 
When disk utility fails to fix Mac OS X file system corruption issues
When disk utility fails to fix Mac OS X file system corruption issuesWhen disk utility fails to fix Mac OS X file system corruption issues
When disk utility fails to fix Mac OS X file system corruption issues
 
Tech comm presentation 2014 01-16
Tech comm presentation 2014 01-16Tech comm presentation 2014 01-16
Tech comm presentation 2014 01-16
 
Data Recovered Archives
Data Recovered ArchivesData Recovered Archives
Data Recovered Archives
 
Understanding Memory in Computing part 1.pptx
Understanding Memory in Computing part 1.pptxUnderstanding Memory in Computing part 1.pptx
Understanding Memory in Computing part 1.pptx
 
ResearchPaperITDF2435
ResearchPaperITDF2435ResearchPaperITDF2435
ResearchPaperITDF2435
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
 

Recently uploaded

Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
hublikarsn
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 

Recently uploaded (20)

Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdf
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata Model
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
 

DATA RECOVERY TECHNIQUES

  • 1. G. H. RAISONI COLLEGE OF ENGG. & MANAGEMENT Gat No. 1200, Wagholi, Pune – 412 207 DEPARTMENT OF COMPUTER ENGINEERING TAE:- 1 (An Autonomous Institute Affiliated to Savitribai Phule Pune University) TOPIC : Data Recovery Techniques Presented by : 1) Venkatesh Pensalwar (TCOB93) 2) sanket uttarwar(TCOB98) 3) Shivam Ramanvar (TCOB95) 4) Shivam Ranjwe (TCOB96)
  • 2. What is Data Loss?  Data has accidentally been erased or data control structures have been overwritten.  Data has been corrupted or made inaccessible.  Data is unable to be accessed from a previous functioning computer system or backup.
  • 3. Data Recovery  Data recovery is a process of salvaging inaccessible data from damaged or corrupted secondary storage , when the data store cannot be accessed in a normal way.  The data is most often salvaged from storage media such as internal or external hard disk drives (HDDs), USB flash drives , solid-state drives (SSDs), magnetic tapes, CDs, DVDs, and other electronic devices.
  • 4. What Causes Data Loss?  Natural Disaster  Hardware Error  Virus Attack  Human Error  Intentional deletion  Accidental overwriting of files  Software Corruption
  • 5. How to Prevent Data Loss  Don’t upgrade hardware or software without having a backup  Physically secure your system from intruders  Use firewalls and virus protection  Be prepared for physical disasters
  • 6. Data Recovery Techniques  Use of software to recover data  Use of machines to recover data
  • 7. Software or logical Data Extraction  Data extraction is the process of moving data off of the imaged drive to another destination location.  Data extraction software scans sectors of the hard drive and restructures the file system either in memory or another hard drive.  The software can be used to copy the recoverable data to a destination location.
  • 8. Software Recovery  Data loss can occur because the hard drive may have problems accessing the data it contains at a software or logical level.  By making an exact copy including all deleted information) of the hard drive, using a program such as Norton GHOST, most data recovery programs search for deleted MFT (Master File Table) entries to undelete files.  If the MFT is corrupt or defective, this method will not work. Some data recovery programs will ignore the MFT and search all of the unallocated clusters to try to find and recover files.
  • 9. Physical Data Recovery  The user may send a failed hard disk drive to a private data recovery company that offers secure and confidential data recovery.  The data recovery company will carefully perform part replacement of the heads, spindle motor and base casting, the electronics board, etc. in a clean room environment.  Part replacement has historically been successful for data recovery about 40%-60% of the time.
  • 10. Data Recovery Techniques Scanning Probe Microscopy (SPM)  A technique that is used to image and measure surfaces at the atomic level.  Scans an atomically sharp probe over a surface which produces a 3D topographic image of the surface at the atomic scale.
  • 11. Data Recovery Tips Do’s: •Do try to back up your important data on a daily or weekly basis •If your hard disk is not getting detected, do use a different cable to connect the hard disk •After data loss, remove your storage device and keep it in a safe place •If you are unable to access your storage drive and data is lost, then immediately stop using your drive and download a data recovery software to get them back •Do turn off your system, when you hear any clicking / grinding noise from your hard disk •Do install an effective antivirus program to scan and remove viruses causing data loss from your system
  • 12. Don’ts: •Don’t make attempts to recover your lost data by yourself •Do not store your important data on hard disk having Bad sectors •Don’t download application programs from unknown sites •Do not store or copy new files to your hard disk after data loss as this can overwrite the deleted / lost files beyond the scope of recovery •Don’t try to open your physically damaged hard disk Do not use any third party application software to create, delete or repartition your hard disk