SlideShare a Scribd company logo
Data Recovery
Aakash Mehta     Bhaumik Chaudhari
  10IT026           10IT053

     Shankersinh Vaghela Bapu
       Institute Of Technology
            Nov 22nd, 2012
Overview
   What is Data Recovery?
   Disk Structure
   Software used
   Real World Uses
   Advantages & Disadvantages
   Demo

                Shankersinh Vaghela Bapu
                 Institute Of Technology   2
What is data recovery?
   Retrieving deleted/inaccessible data from electronic
    storage media (hard drives, removable media, optical
    devices, etc...)


   Typical causes of loss include:
       Computer Virus
       Data Corruption
       Computer Crime
       Human Error


                          Shankersinh Vaghela Bapu
                           Institute Of Technology         3
Disk Structure
   A. Track

   B. Geometrical Sector

   C. Track Sector

   D. Cluster
                   Shankersinh Vaghela Bapu
                    Institute Of Technology   4
Several forms of Disk Storage


   Comparison of several
    forms of disk storage
    showing tracks.




                     Shankersinh Vaghela Bapu
                      Institute Of Technology   5
How data is Stored ?
   Data is stored into magnetic blocks which are in
    sectors.
   Every time you format HDD, new layer is
    created.
   With the increase of layers memory blocks are
    also increased and it results to variations in data
    transfer(Speed Decrease, Memory consumption
    high).

                     Shankersinh Vaghela Bapu
                      Institute Of Technology         6
How Data Is Recovered?
   At the First time Low Level Format(LLF) is
    performed on the hard disk, the disk’s platters
    start out empty. That’s the last time the platters
    will be empty for the life of the drive.
   If an LLF is done on a disk with data on it
    already, the data is permanently erased.
   The type of formatting that most users are
    familiar with is called high-level formatting and it
    is the process of setting up an empty file system.
                     Shankersinh Vaghela Bapu
                      Institute Of Technology          7
How Data Is Recovered?
   Data stored on the hard drive is not physically
    deleted during formatting.
   The hard drive is re-organized and the table with
    information where files are stored is reset.
   As long as the file system and its settings remain
    the same, none of the actual data previously
    stored on the hard drive is deleted or overwritten
    can subsequently be recovered.

                    Shankersinh Vaghela Bapu
                     Institute Of Technology         8
How Data Is Recovered?
   When Data is overwritten, the magnetic domains
    on the HDD are re-magnetized.
   This is an irreversible process that physically
    removes information previously stored in this
    location. 
   This would require the use of a Magnetic force
    microscopy (MFM) or similar technologies, to
    recover overwritten data successfully.
   There is no software or other technical way
    known to the public that can restore overwritten
    data.             Shankersinh Vaghela Bapu
                       Institute Of Technology       9
Software For Data Recovery
   Stellar Phoenix Windows Data Recovery

   Stellar phoenix Linux Data Recovery

   Get Data Back-NTFS

   Get Data Back-FAT

                   Shankersinh Vaghela Bapu
                    Institute Of Technology   10
Operating Systems
   Helix:
-   Helix is a Linux based forensics operating
    system.
-   It is combined system used to analyse the file
    system and also generates the reports.
   Encase:
-   It is also very rich utility designed for the
    professionals.
                    Shankersinh Vaghela Bapu
                     Institute Of Technology         11
Real World Uses
   Average User:
       Recover important lost files
       Keep your private information private
   Law enforcement:
       Locate illegal data
       Restore deleted/overwritten information.
       Prosecute criminals based on discovered data

                     Shankersinh Vaghela Bapu
                      Institute Of Technology     12
Advantages
   Recover important data easily by using various
    software.

   If you work for an organization than your data
    should be most important and you need to
    recover at any cost if it is lost.

   Recover your personal photo's, files and etc
    which is precious to you.
                    Shankersinh Vaghela Bapu
                     Institute Of Technology         13
Disadvantages
   There is no surety that all of the lost data can be
    recovered.




                     Shankersinh Vaghela Bapu
                      Institute Of Technology         14
Private Recovery Services
   Many private companies offer quick, secure, and
    confidential data recovery:
       Computer Disk Service http://www.compdisk.com
            20 GB from $195.00
            46 GB and up – from $895.00
       Action Front http://www.datarec.com/
            External cases - $500 to $1500
            Internal cases -$2500 to $4000 for a single hard drive
            Critical Response services start at $5,000.
       Data Recovery Services -
        http://www.datarecovery.net/
                             Shankersinh Vaghela Bapu
                              Institute Of Technology                 15
References
   "Data Recovery Solutions". R3 Data Recovery. Retrieved 13 October 2012.
    "Computer Forensics Schools and Training" . Legal-Criminal-Justice-Schools.com. Retrieved 13
    October 2012.
    Zeno, Keneth (27 September 2011).  "How Does Data Recovery Work?" . Data Recovery Box.
    Retrieved 29 February 2012.
    Secure Deletion of Data from Magnetic and Solid-State Memory , Peter Gutmann, Department of
    Computer Science, University of Auckland
    Data Remanence in Semiconductor Devices , Peter Gutmann, IBM T.J. Watson Research Center
    Feenberg, Daniel (14 May 2004). 
    "Can Intelligence Agencies Read Overwritten Data? A response to Gutmann." . National Bureau
    of Economic Research. Retrieved 21 May 2008.
   Data Removal and Erasure from Hard Disk Drives
    "Disk Wiping - One Pass is Enough" . Anti-Forensics. 17 March 2009.
    "Disk Wiping - One Pass is Enough - Part 2 (this time with screenshots)" . Anti-Forensics. 18
    March 2009.
    Wright, Dr. Craig (15 January 2009). "Overwriting Hard Drive Data" .
    "Data Recovery Possible on Securely Erased SSDs" . Retrieved 22 November 2011.
                                     Shankersinh Vaghela Bapu
                                      Institute Of Technology                                        16
QUESTIONS?




 Shankersinh Vaghela Bapu
  Institute Of Technology   17

More Related Content

What's hot

Data recovery power point
Data recovery power pointData recovery power point
Data recovery power point
tutannandi
 
Data recovery from storage device
Data recovery from storage deviceData recovery from storage device
Data recovery from storage device
Mohit Shah
 
CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationCNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic Duplication
Sam Bowne
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
Kathirvel Ayyaswamy
 
Memory forensics
Memory forensicsMemory forensics
Memory forensicsSunil Kumar
 
Windows forensic artifacts
Windows forensic artifactsWindows forensic artifacts
Windows forensic artifacts
n|u - The Open Security Community
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
primeteacher32
 
Data recovery with a view of digital forensics
Data recovery with a view of digital forensics Data recovery with a view of digital forensics
Data recovery with a view of digital forensics
Ahmed Hashad
 
L6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxL6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptx
Bhupeshkumar Nanhe
 
Data recovery
Data recoveryData recovery
Data recovery
Ravi Malik
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - NotesKranthi
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
Priya Manik
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - NotesKranthi
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
Anpumathews
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
deaneal
 
Memory Forensics
Memory ForensicsMemory Forensics
Network forensic
Network forensicNetwork forensic
Network forensic
Manjushree Mashal
 
Data Acquisition
Data AcquisitionData Acquisition
Data Acquisition
primeteacher32
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
Manu Mathew Cherian
 

What's hot (20)

Data recovery power point
Data recovery power pointData recovery power point
Data recovery power point
 
Data recovery from storage device
Data recovery from storage deviceData recovery from storage device
Data recovery from storage device
 
CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationCNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic Duplication
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Memory forensics
Memory forensicsMemory forensics
Memory forensics
 
Windows forensic artifacts
Windows forensic artifactsWindows forensic artifacts
Windows forensic artifacts
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
Module 02 ftk imager
Module 02 ftk imagerModule 02 ftk imager
Module 02 ftk imager
 
Data recovery with a view of digital forensics
Data recovery with a view of digital forensics Data recovery with a view of digital forensics
Data recovery with a view of digital forensics
 
L6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxL6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptx
 
Data recovery
Data recoveryData recovery
Data recovery
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Memory Forensics
Memory ForensicsMemory Forensics
Memory Forensics
 
Network forensic
Network forensicNetwork forensic
Network forensic
 
Data Acquisition
Data AcquisitionData Acquisition
Data Acquisition
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 

Viewers also liked

Harris Bdr
Harris BdrHarris Bdr
Harris Bdr
wericsmith
 
Get familiar with data recovery process
Get familiar with data recovery processGet familiar with data recovery process
Get familiar with data recovery process
emandatarecovery
 
Stellar Phoenix Windows Data Recovery v7
Stellar Phoenix Windows Data Recovery v7Stellar Phoenix Windows Data Recovery v7
Stellar Phoenix Windows Data Recovery v7
Prannay Shahi
 
data recovery training course online offline INTERSOFT
data recovery training course online offline  INTERSOFT data recovery training course online offline  INTERSOFT
data recovery training course online offline INTERSOFT
Abdullah Khan
 
The Future Of Computers
The Future Of ComputersThe Future Of Computers
The Future Of Computersskyhighphoto83
 
Future of Computers
Future of ComputersFuture of Computers
Future of Computers
guest19ab3c
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesSpiceworks
 
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyPresentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyTehmina Gulfam
 
tablet presentation
tablet presentationtablet presentation
tablet presentationAnju K John
 
Data recovery in chennai _Hard Disk Data Recovery -Raminfotech
Data recovery in chennai _Hard Disk Data Recovery -RaminfotechData recovery in chennai _Hard Disk Data Recovery -Raminfotech
Data recovery in chennai _Hard Disk Data Recovery -Raminfotech
Data Recovery
 
Tablet pc will be the future of computer
Tablet pc will be the future of computerTablet pc will be the future of computer
Tablet pc will be the future of computershafia Nadeem
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Viewers also liked (13)

Harris Bdr
Harris BdrHarris Bdr
Harris Bdr
 
Get familiar with data recovery process
Get familiar with data recovery processGet familiar with data recovery process
Get familiar with data recovery process
 
Stellar Phoenix Windows Data Recovery v7
Stellar Phoenix Windows Data Recovery v7Stellar Phoenix Windows Data Recovery v7
Stellar Phoenix Windows Data Recovery v7
 
data recovery training course online offline INTERSOFT
data recovery training course online offline  INTERSOFT data recovery training course online offline  INTERSOFT
data recovery training course online offline INTERSOFT
 
Tablet PC
Tablet PCTablet PC
Tablet PC
 
The Future Of Computers
The Future Of ComputersThe Future Of Computers
The Future Of Computers
 
Future of Computers
Future of ComputersFuture of Computers
Future of Computers
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup Strategies
 
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyPresentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy
 
tablet presentation
tablet presentationtablet presentation
tablet presentation
 
Data recovery in chennai _Hard Disk Data Recovery -Raminfotech
Data recovery in chennai _Hard Disk Data Recovery -RaminfotechData recovery in chennai _Hard Disk Data Recovery -Raminfotech
Data recovery in chennai _Hard Disk Data Recovery -Raminfotech
 
Tablet pc will be the future of computer
Tablet pc will be the future of computerTablet pc will be the future of computer
Tablet pc will be the future of computer
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to Data recovery

F1805023942
F1805023942F1805023942
F1805023942
Niro Thakur
 
ResearchPaperITDF2435
ResearchPaperITDF2435ResearchPaperITDF2435
ResearchPaperITDF2435Manuel Garza
 
3170725_Unit-4.pptx
3170725_Unit-4.pptx3170725_Unit-4.pptx
3170725_Unit-4.pptx
YashPatel132112
 
The Importance Of Computer System Backup Today
The Importance Of Computer System Backup TodayThe Importance Of Computer System Backup Today
The Importance Of Computer System Backup Today
Daniel Nilles
 
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...An Analyzing of different Techniques and Tools to Recover Data from Volatile ...
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...
ijsrd.com
 
CSE4004_Module4_1.pptx
CSE4004_Module4_1.pptxCSE4004_Module4_1.pptx
CSE4004_Module4_1.pptx
HARIKETSUKESHKUMARSH
 
Latest presentation
Latest presentationLatest presentation
Latest presentation
Adetunji Adeoje
 
CSE4004_Module2_1.pptx
CSE4004_Module2_1.pptxCSE4004_Module2_1.pptx
CSE4004_Module2_1.pptx
HARIKETSUKESHKUMARSH
 
Data Recovered Archives
Data Recovered ArchivesData Recovered Archives
Data Recovered Archiveseldige19g0
 
computer forensics
computer forensicscomputer forensics
computer forensicsAkhil Kumar
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
Agape Inc
 
Next-generation sequencing: Data mangement
Next-generation sequencing: Data mangementNext-generation sequencing: Data mangement
Next-generation sequencing: Data mangement
Guy Coates
 
Linux Recovery
Linux RecoveryLinux Recovery
Linux Recovery
Víctor Capetillo
 
Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryCscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recovery
Alireza Ghahrood
 
data recovery-raid
data recovery-raiddata recovery-raid
data recovery-raid
University of Potsdam
 
m+storeMemory storage
m+storeMemory storagem+storeMemory storage
m+storeMemory storage
Owen Funnell
 
Data Storage in DNA Documentation
Data Storage in DNA Documentation Data Storage in DNA Documentation
Data Storage in DNA Documentation
Aditya Nag
 

Similar to Data recovery (20)

F1805023942
F1805023942F1805023942
F1805023942
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
ResearchPaperITDF2435
ResearchPaperITDF2435ResearchPaperITDF2435
ResearchPaperITDF2435
 
3170725_Unit-4.pptx
3170725_Unit-4.pptx3170725_Unit-4.pptx
3170725_Unit-4.pptx
 
The Importance Of Computer System Backup Today
The Importance Of Computer System Backup TodayThe Importance Of Computer System Backup Today
The Importance Of Computer System Backup Today
 
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...An Analyzing of different Techniques and Tools to Recover Data from Volatile ...
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...
 
CSE4004_Module4_1.pptx
CSE4004_Module4_1.pptxCSE4004_Module4_1.pptx
CSE4004_Module4_1.pptx
 
Latest presentation
Latest presentationLatest presentation
Latest presentation
 
Fs Ch 18
Fs Ch 18Fs Ch 18
Fs Ch 18
 
CSE4004_Module2_1.pptx
CSE4004_Module2_1.pptxCSE4004_Module2_1.pptx
CSE4004_Module2_1.pptx
 
Data Recovered Archives
Data Recovered ArchivesData Recovered Archives
Data Recovered Archives
 
test
testtest
test
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
 
Next-generation sequencing: Data mangement
Next-generation sequencing: Data mangementNext-generation sequencing: Data mangement
Next-generation sequencing: Data mangement
 
Linux Recovery
Linux RecoveryLinux Recovery
Linux Recovery
 
Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryCscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recovery
 
data recovery-raid
data recovery-raiddata recovery-raid
data recovery-raid
 
m+storeMemory storage
m+storeMemory storagem+storeMemory storage
m+storeMemory storage
 
Data Storage in DNA Documentation
Data Storage in DNA Documentation Data Storage in DNA Documentation
Data Storage in DNA Documentation
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 

Recently uploaded (20)

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

Data recovery

  • 1. Data Recovery Aakash Mehta Bhaumik Chaudhari 10IT026 10IT053 Shankersinh Vaghela Bapu Institute Of Technology Nov 22nd, 2012
  • 2. Overview  What is Data Recovery?  Disk Structure  Software used  Real World Uses  Advantages & Disadvantages  Demo Shankersinh Vaghela Bapu Institute Of Technology 2
  • 3. What is data recovery?  Retrieving deleted/inaccessible data from electronic storage media (hard drives, removable media, optical devices, etc...)  Typical causes of loss include:  Computer Virus  Data Corruption  Computer Crime  Human Error Shankersinh Vaghela Bapu Institute Of Technology 3
  • 4. Disk Structure  A. Track  B. Geometrical Sector  C. Track Sector  D. Cluster Shankersinh Vaghela Bapu Institute Of Technology 4
  • 5. Several forms of Disk Storage  Comparison of several forms of disk storage showing tracks. Shankersinh Vaghela Bapu Institute Of Technology 5
  • 6. How data is Stored ?  Data is stored into magnetic blocks which are in sectors.  Every time you format HDD, new layer is created.  With the increase of layers memory blocks are also increased and it results to variations in data transfer(Speed Decrease, Memory consumption high). Shankersinh Vaghela Bapu Institute Of Technology 6
  • 7. How Data Is Recovered?  At the First time Low Level Format(LLF) is performed on the hard disk, the disk’s platters start out empty. That’s the last time the platters will be empty for the life of the drive.  If an LLF is done on a disk with data on it already, the data is permanently erased.  The type of formatting that most users are familiar with is called high-level formatting and it is the process of setting up an empty file system. Shankersinh Vaghela Bapu Institute Of Technology 7
  • 8. How Data Is Recovered?  Data stored on the hard drive is not physically deleted during formatting.  The hard drive is re-organized and the table with information where files are stored is reset.  As long as the file system and its settings remain the same, none of the actual data previously stored on the hard drive is deleted or overwritten can subsequently be recovered. Shankersinh Vaghela Bapu Institute Of Technology 8
  • 9. How Data Is Recovered?  When Data is overwritten, the magnetic domains on the HDD are re-magnetized.  This is an irreversible process that physically removes information previously stored in this location.   This would require the use of a Magnetic force microscopy (MFM) or similar technologies, to recover overwritten data successfully.  There is no software or other technical way known to the public that can restore overwritten data. Shankersinh Vaghela Bapu Institute Of Technology 9
  • 10. Software For Data Recovery  Stellar Phoenix Windows Data Recovery  Stellar phoenix Linux Data Recovery  Get Data Back-NTFS  Get Data Back-FAT Shankersinh Vaghela Bapu Institute Of Technology 10
  • 11. Operating Systems  Helix: - Helix is a Linux based forensics operating system. - It is combined system used to analyse the file system and also generates the reports.  Encase: - It is also very rich utility designed for the professionals. Shankersinh Vaghela Bapu Institute Of Technology 11
  • 12. Real World Uses  Average User:  Recover important lost files  Keep your private information private  Law enforcement:  Locate illegal data  Restore deleted/overwritten information.  Prosecute criminals based on discovered data Shankersinh Vaghela Bapu Institute Of Technology 12
  • 13. Advantages  Recover important data easily by using various software.  If you work for an organization than your data should be most important and you need to recover at any cost if it is lost.  Recover your personal photo's, files and etc which is precious to you. Shankersinh Vaghela Bapu Institute Of Technology 13
  • 14. Disadvantages  There is no surety that all of the lost data can be recovered. Shankersinh Vaghela Bapu Institute Of Technology 14
  • 15. Private Recovery Services  Many private companies offer quick, secure, and confidential data recovery:  Computer Disk Service http://www.compdisk.com  20 GB from $195.00  46 GB and up – from $895.00  Action Front http://www.datarec.com/  External cases - $500 to $1500  Internal cases -$2500 to $4000 for a single hard drive  Critical Response services start at $5,000.  Data Recovery Services - http://www.datarecovery.net/ Shankersinh Vaghela Bapu Institute Of Technology 15
  • 16. References  "Data Recovery Solutions". R3 Data Recovery. Retrieved 13 October 2012.   "Computer Forensics Schools and Training" . Legal-Criminal-Justice-Schools.com. Retrieved 13 October 2012.   Zeno, Keneth (27 September 2011).  "How Does Data Recovery Work?" . Data Recovery Box. Retrieved 29 February 2012.   Secure Deletion of Data from Magnetic and Solid-State Memory , Peter Gutmann, Department of Computer Science, University of Auckland   Data Remanence in Semiconductor Devices , Peter Gutmann, IBM T.J. Watson Research Center   Feenberg, Daniel (14 May 2004).  "Can Intelligence Agencies Read Overwritten Data? A response to Gutmann." . National Bureau of Economic Research. Retrieved 21 May 2008.  Data Removal and Erasure from Hard Disk Drives   "Disk Wiping - One Pass is Enough" . Anti-Forensics. 17 March 2009.   "Disk Wiping - One Pass is Enough - Part 2 (this time with screenshots)" . Anti-Forensics. 18 March 2009.   Wright, Dr. Craig (15 January 2009). "Overwriting Hard Drive Data" .   "Data Recovery Possible on Securely Erased SSDs" . Retrieved 22 November 2011. Shankersinh Vaghela Bapu Institute Of Technology 16
  • 17. QUESTIONS? Shankersinh Vaghela Bapu Institute Of Technology 17