SlideShare a Scribd company logo
Data Recovery
PRESENTED BY :
ABHINAV PARIHAR
1219213005
Overview
 What is Data Recovery?
 How can it be used?
 Techniques
 Recovery Methods
 Secure Deletion
 What can you do?
What is data recovery?
 Retrieving deleted/inaccessible data from electronic
storage media (hard drives, removable media,
optical devices, etc...) is called as Data recovery.
 Typical causes of loss include:
 Electro-mechanical Failure
 Natural Disaster
 Computer Virus
 Data Corruption
 Computer Crime
 Human Error
Cases of Recovery
FIRE
Found after a fire
destroyed a 100 year old
home – All data
Recovered
CRUSHED
A bus runs over a laptop
– All data recovered
SOAKED
PowerBook trapped
underwater for two
days – All data
recovered
What is Data Loss?
 Data has accidentally been erased or data control structures
have been overwritten.
 Data has been corrupted or made inaccessible.
 Data is unable to be accessed from a previous functioning
computer system or backup.
What Causes Data Loss?
 Sabotage(Destroy or Damage)
 Natural Disaster
 Hardware Error
 Virus Attack
 Human Error
 Intentional deletion
 Accidental overwriting of files
 Software Corruption
What Causes Data Loss?
Facts of Data Recovery
 The majority of data loss situations are recoverable.
 Computer storage systems may fail, but the data stored
on them is not always completely lost.
 There are occasions when damage to data is permanent
and complete data recovery is not possible. However,
some data is usually always recoverable.
 Data recovery professionals can recover data from
crashed hard drives, operating systems, storage devices,
servers, desktops, and laptops using various proprietary
data recovery tools and techniques.
Data Recovery Techniques
Use of software to recover
data
Use of machines to recover
data
Software Data Extraction
 Data extraction is the process of moving data
off of the imaged drive to another destination
location.
 Data extraction software scans sectors of the
hard drive and restructures the file system either
in memory or another hard drive.
 The software can be used to copy the
recoverable data to a destination location.
Data Recovery
 The user may send a failed hard disk drive to a
private data recovery company that offers
secure and confidential data recovery.
 The data recovery company will carefully
perform part replacement of the heads, spindle
motor and base casting, the electronics board,
etc. in a clean room environment.
 Part replacement has historically been
successful for data recovery about 40%-60% of
the time.
Data Recovery Techniques :
Scanning Probe Microscopy
(SPM)
 A technique that is used to image and measure surfaces at
the atomic level.
 Scans an atomically sharp probe over a surface which
produces a 3D topographic image of the surface at the
atomic scale.
Data Recovery Techniques
Magnetic Force
Microscopy (MFM)
 MFM (Magnetic Force Microscopy) is a new
technique which images the spatial variation of
magnetic forces on a sample surface.
 MFM is derived from scanning probe
microscopy (SPM) and uses a sharp magnetic
tip attached to a flexible cantilever for analysis.
 An image of the field at the surface is formed
by moving the tip across the surface and
measuring the force.
Magnetic Force Microscopy (MFM)
 Detectable old data will be present beside new data on the track
which is usually ignored.
 Together with software, MFM can see past various kinds of data
loss/removal.
 Each track contains an image of everything ever written to it, but
each layer gets progressively smaller the earlier it was written.
Magnetic Force Microscopy (MFM)
 MFM looks at the minute sampling region to detect remnant
magnetization at track edges.
MFM image showing the
bits of a hard disk
Scanning Tunneling Microscopy
(STM)
 STM (Scanning Tunneling Microscopy) is a more
recent variation of MFM which uses a probe tip
typically made by plating nickel onto a pre-
patterned surface.
 The probe is scanned across the surface that is to
be analyzed. STM measures a weak electrical
current flowing between the tip and the sample.
The image is then generated in the same way as
MFM.
Summary
 Individuals or companies may experience data loss
at any time for many reasons.
 There are various steps that should be implemented
to help prevent data loss.
 Data loss can be very costly and very upsetting.
 There are several data recovery techniques that
have proven to be successful or partially successful
in recovering data.
 Utilizing qualified professional data recovery
specialists will aid in the degree of success of data
recovery.
QUESTIONS?

More Related Content

What's hot

CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationCNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic Duplication
Sam Bowne
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
Priya Manik
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - NotesKranthi
 
Data recovery from storage device
Data recovery from storage deviceData recovery from storage device
Data recovery from storage device
Mohit Shah
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
Parsons Corporation
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
Cleverence Kombe
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
Kathirvel Ayyaswamy
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - NotesKranthi
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
Yansi Keim
 
computer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software toolscomputer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software tools
N.Jagadish Kumar
 
Data recovery
Data recoveryData recovery
Data recovery
Suresh Hirpara
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
Ambuj Kumar
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
newbie2019
 
Introduction to filesystems and computer forensics
Introduction to filesystems and computer forensicsIntroduction to filesystems and computer forensics
Introduction to filesystems and computer forensics
Mayank Chaudhari
 
File system
File systemFile system
File system
Harleen Johal
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
Dr Raghu Khimani
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidence
Online
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
rakesh mishra
 

What's hot (20)

CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationCNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic Duplication
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - Notes
 
Data recovery from storage device
Data recovery from storage deviceData recovery from storage device
Data recovery from storage device
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
computer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software toolscomputer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software tools
 
Data recovery
Data recoveryData recovery
Data recovery
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
 
Module 02 ftk imager
Module 02 ftk imagerModule 02 ftk imager
Module 02 ftk imager
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
 
Introduction to filesystems and computer forensics
Introduction to filesystems and computer forensicsIntroduction to filesystems and computer forensics
Introduction to filesystems and computer forensics
 
File system
File systemFile system
File system
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidence
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 

Viewers also liked

Database recovery
Database recoveryDatabase recovery
Database recovery
Vritti Malhotra
 
Database recovery techniques
Database recovery techniquesDatabase recovery techniques
Database recovery techniques
pusp220
 
Topic 4 database recovery
Topic 4 database recoveryTopic 4 database recovery
Topic 4 database recovery
acap paei
 
Database backup and recovery
Database backup and recoveryDatabase backup and recovery
Database backup and recovery
Anne Lee
 
Database security
Database securityDatabase security
Database security
Software Engineering
 
Database Security
Database SecurityDatabase Security
Database Security
alraee
 

Viewers also liked (8)

Database recovery
Database recoveryDatabase recovery
Database recovery
 
Database recovery techniques
Database recovery techniquesDatabase recovery techniques
Database recovery techniques
 
Topic 4 database recovery
Topic 4 database recoveryTopic 4 database recovery
Topic 4 database recovery
 
Database backup and recovery
Database backup and recoveryDatabase backup and recovery
Database backup and recovery
 
Database security
Database securityDatabase security
Database security
 
Data integrity
Data integrityData integrity
Data integrity
 
Database Security
Database SecurityDatabase Security
Database Security
 
Data integrity
Data integrityData integrity
Data integrity
 

Similar to Data recovery

Data recovery system
Data recovery systemData recovery system
Data recovery system
karanbhale
 
Get your Lost Data Back Now - Understanding Data Recovery
Get your Lost Data Back Now - Understanding Data RecoveryGet your Lost Data Back Now - Understanding Data Recovery
Get your Lost Data Back Now - Understanding Data Recovery
Arthur King
 
Data recovery
Data recoveryData recovery
Data recovery
Ravi Malik
 
Low Cost Visual Support System for Challenged People
Low Cost Visual Support System for Challenged PeopleLow Cost Visual Support System for Challenged People
Low Cost Visual Support System for Challenged People
Christo Ananth
 
An optical satellite tracking system for undergraduate research bruski, jon...
An optical satellite tracking system for undergraduate research   bruski, jon...An optical satellite tracking system for undergraduate research   bruski, jon...
An optical satellite tracking system for undergraduate research bruski, jon...
Srinivas Naidu
 
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
Felipe Prado
 
Density-Based Multi feature Background Subtraction with Support Vector Machine
Density-Based Multi feature Background Subtraction with  Support Vector MachineDensity-Based Multi feature Background Subtraction with  Support Vector Machine
Density-Based Multi feature Background Subtraction with Support Vector Machine
NAZNEEN BEGUM
 
H123.pptx
H123.pptxH123.pptx
H123.pptx
HarshithaHC7
 
Introduction to computers
Introduction to computersIntroduction to computers
Introduction to computers
PAVAN KUMAR ILLA
 
Principles of Information Technology
Principles of Information TechnologyPrinciples of Information Technology
Principles of Information TechnologySubair Ali
 
Project on computer assembling
Project on computer assemblingProject on computer assembling
Project on computer assembling
Subhojit Paul
 
Monte carlo methods in graphics and hacking
Monte carlo methods in graphics and hackingMonte carlo methods in graphics and hacking
Monte carlo methods in graphics and hacking
Himanshu Goel
 
Functional block diagram_of_laser_printer
Functional block diagram_of_laser_printerFunctional block diagram_of_laser_printer
Functional block diagram_of_laser_printer
Kartik Kalpande Patil
 
Design Description of a Tentacle Based Scanning System
Design Description of a Tentacle Based Scanning SystemDesign Description of a Tentacle Based Scanning System
Design Description of a Tentacle Based Scanning System
Oyeniyi Samuel
 
Big Data Analytics for Power Grid Operations
Big Data Analytics for Power Grid OperationsBig Data Analytics for Power Grid Operations
Big Data Analytics for Power Grid Operations
Power System Operation
 
Restoration of Old Documents that Suffer from Degradation
Restoration of Old Documents that Suffer from DegradationRestoration of Old Documents that Suffer from Degradation
Restoration of Old Documents that Suffer from Degradation
IRJET Journal
 
Paper id 42201619
Paper id 42201619Paper id 42201619
Paper id 42201619
IJRAT
 
Introduction to Computer System-ppt.pptx
Introduction to Computer System-ppt.pptxIntroduction to Computer System-ppt.pptx
Introduction to Computer System-ppt.pptx
InfofarazMotivativeA
 

Similar to Data recovery (20)

Data recovery system
Data recovery systemData recovery system
Data recovery system
 
Data recovery
Data recoveryData recovery
Data recovery
 
Get your Lost Data Back Now - Understanding Data Recovery
Get your Lost Data Back Now - Understanding Data RecoveryGet your Lost Data Back Now - Understanding Data Recovery
Get your Lost Data Back Now - Understanding Data Recovery
 
Data recovery
Data recoveryData recovery
Data recovery
 
Low Cost Visual Support System for Challenged People
Low Cost Visual Support System for Challenged PeopleLow Cost Visual Support System for Challenged People
Low Cost Visual Support System for Challenged People
 
Sigma_Xi_Fall_2013
Sigma_Xi_Fall_2013Sigma_Xi_Fall_2013
Sigma_Xi_Fall_2013
 
An optical satellite tracking system for undergraduate research bruski, jon...
An optical satellite tracking system for undergraduate research   bruski, jon...An optical satellite tracking system for undergraduate research   bruski, jon...
An optical satellite tracking system for undergraduate research bruski, jon...
 
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
 
Density-Based Multi feature Background Subtraction with Support Vector Machine
Density-Based Multi feature Background Subtraction with  Support Vector MachineDensity-Based Multi feature Background Subtraction with  Support Vector Machine
Density-Based Multi feature Background Subtraction with Support Vector Machine
 
H123.pptx
H123.pptxH123.pptx
H123.pptx
 
Introduction to computers
Introduction to computersIntroduction to computers
Introduction to computers
 
Principles of Information Technology
Principles of Information TechnologyPrinciples of Information Technology
Principles of Information Technology
 
Project on computer assembling
Project on computer assemblingProject on computer assembling
Project on computer assembling
 
Monte carlo methods in graphics and hacking
Monte carlo methods in graphics and hackingMonte carlo methods in graphics and hacking
Monte carlo methods in graphics and hacking
 
Functional block diagram_of_laser_printer
Functional block diagram_of_laser_printerFunctional block diagram_of_laser_printer
Functional block diagram_of_laser_printer
 
Design Description of a Tentacle Based Scanning System
Design Description of a Tentacle Based Scanning SystemDesign Description of a Tentacle Based Scanning System
Design Description of a Tentacle Based Scanning System
 
Big Data Analytics for Power Grid Operations
Big Data Analytics for Power Grid OperationsBig Data Analytics for Power Grid Operations
Big Data Analytics for Power Grid Operations
 
Restoration of Old Documents that Suffer from Degradation
Restoration of Old Documents that Suffer from DegradationRestoration of Old Documents that Suffer from Degradation
Restoration of Old Documents that Suffer from Degradation
 
Paper id 42201619
Paper id 42201619Paper id 42201619
Paper id 42201619
 
Introduction to Computer System-ppt.pptx
Introduction to Computer System-ppt.pptxIntroduction to Computer System-ppt.pptx
Introduction to Computer System-ppt.pptx
 

Recently uploaded

Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 

Recently uploaded (20)

Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 

Data recovery

  • 1. Data Recovery PRESENTED BY : ABHINAV PARIHAR 1219213005
  • 2. Overview  What is Data Recovery?  How can it be used?  Techniques  Recovery Methods  Secure Deletion  What can you do?
  • 3. What is data recovery?  Retrieving deleted/inaccessible data from electronic storage media (hard drives, removable media, optical devices, etc...) is called as Data recovery.  Typical causes of loss include:  Electro-mechanical Failure  Natural Disaster  Computer Virus  Data Corruption  Computer Crime  Human Error
  • 4. Cases of Recovery FIRE Found after a fire destroyed a 100 year old home – All data Recovered CRUSHED A bus runs over a laptop – All data recovered SOAKED PowerBook trapped underwater for two days – All data recovered
  • 5. What is Data Loss?  Data has accidentally been erased or data control structures have been overwritten.  Data has been corrupted or made inaccessible.  Data is unable to be accessed from a previous functioning computer system or backup.
  • 6. What Causes Data Loss?  Sabotage(Destroy or Damage)  Natural Disaster  Hardware Error  Virus Attack  Human Error  Intentional deletion  Accidental overwriting of files  Software Corruption
  • 8. Facts of Data Recovery  The majority of data loss situations are recoverable.  Computer storage systems may fail, but the data stored on them is not always completely lost.  There are occasions when damage to data is permanent and complete data recovery is not possible. However, some data is usually always recoverable.  Data recovery professionals can recover data from crashed hard drives, operating systems, storage devices, servers, desktops, and laptops using various proprietary data recovery tools and techniques.
  • 9. Data Recovery Techniques Use of software to recover data Use of machines to recover data
  • 10. Software Data Extraction  Data extraction is the process of moving data off of the imaged drive to another destination location.  Data extraction software scans sectors of the hard drive and restructures the file system either in memory or another hard drive.  The software can be used to copy the recoverable data to a destination location.
  • 11. Data Recovery  The user may send a failed hard disk drive to a private data recovery company that offers secure and confidential data recovery.  The data recovery company will carefully perform part replacement of the heads, spindle motor and base casting, the electronics board, etc. in a clean room environment.  Part replacement has historically been successful for data recovery about 40%-60% of the time.
  • 12. Data Recovery Techniques : Scanning Probe Microscopy (SPM)  A technique that is used to image and measure surfaces at the atomic level.  Scans an atomically sharp probe over a surface which produces a 3D topographic image of the surface at the atomic scale.
  • 13. Data Recovery Techniques Magnetic Force Microscopy (MFM)  MFM (Magnetic Force Microscopy) is a new technique which images the spatial variation of magnetic forces on a sample surface.  MFM is derived from scanning probe microscopy (SPM) and uses a sharp magnetic tip attached to a flexible cantilever for analysis.  An image of the field at the surface is formed by moving the tip across the surface and measuring the force.
  • 14. Magnetic Force Microscopy (MFM)  Detectable old data will be present beside new data on the track which is usually ignored.  Together with software, MFM can see past various kinds of data loss/removal.  Each track contains an image of everything ever written to it, but each layer gets progressively smaller the earlier it was written.
  • 15. Magnetic Force Microscopy (MFM)  MFM looks at the minute sampling region to detect remnant magnetization at track edges.
  • 16. MFM image showing the bits of a hard disk
  • 17. Scanning Tunneling Microscopy (STM)  STM (Scanning Tunneling Microscopy) is a more recent variation of MFM which uses a probe tip typically made by plating nickel onto a pre- patterned surface.  The probe is scanned across the surface that is to be analyzed. STM measures a weak electrical current flowing between the tip and the sample. The image is then generated in the same way as MFM.
  • 18. Summary  Individuals or companies may experience data loss at any time for many reasons.  There are various steps that should be implemented to help prevent data loss.  Data loss can be very costly and very upsetting.  There are several data recovery techniques that have proven to be successful or partially successful in recovering data.  Utilizing qualified professional data recovery specialists will aid in the degree of success of data recovery.