SlideShare a Scribd company logo
DATA RECOVERY
NAME : SHOVAN NANDI
DEPARTMENT : COMPUTER SCIENCE AND ENGINEERING
ROLL NO : 15800114007
REG. NO : 141580110007
YEAR : 3RD
SEMESTER : 6TH
OVERVIEW
• What is Data Recovery?
• The Principle of Data Recovery
• How can it be used?
• The Scope of Data Recovery
• Techniques
– Recovery Methods
– Secure Deletion
Matter needs attention before recovery
Advantages and disadvantages
Conclusion
What is Data Recovery?
It is the process of
salvaging data from
damaged, failed, corrupted,
or inaccessible secondary
storage media when it
cannot be accessed
normally. Recovery may be
required due to physical
damage to the storage
device or logical damage to
the file system.
Cases of Recovery
FIRE
Found after a fire
destroyed a 100 year
old home – All data
Recovered
CRUSHED
A bus runs over a
laptop – All data
recovered
SOAKED
PowerBook
trapped
underwater for
two days – All
data recovered
The Principle of Data Recovery
Data recovery is a process of finding and recovering data, in
which there may be some risk, for no all situations can be
anticipated or prearranged. It means maybe there will be some
unexpected things happen. So we need reduce the danger in
data recovery to the lowest:
• Backup all the data in your hard disk
• Prevent the equipment from being damaged again
• Don’t write anything to the device on which you want to recover data
• Try to get detailed information on how the data lost and the losing process
• Backup the data recovered in time.
Uses of Data Recovery
• Average User:
– Recover important lost files
– Keep your private information private
• Law enforcement:
– Locate illegal data
– Restore deleted/overwritten information.
– Prosecute criminals based on discovered data
The Scope of Data Recovery
There are so many forms and
phenomenon on data problem, we
can divide the objects or scope of
data recovery according to different
symptoms.
The Scope of Data Recovery
System problem:
Can not enter the system or the system is abnormal or
computer closes down.
Key file of system is lost or corrupted, there is some bad
track on hard disk, the hard disk is damaged, MBR or
DBR is lost, or the CMOS setting is incorrect and so on.
Bad track of hardisk:
logic and physical bad track.
Logic bad track is mainly caused by incorrect
operation, and it can be restored by software.
While physical bad track is caused by physical
damage, which is real damage, we can restore it
by changing the partition or sector.
The Scope of Data Recovery
Files loss
If files are lost because of deletion, format or
Ghost clone error, files restoring tools such as
Data Recovery Wizard can be used to recover
data.
Partition problem
partition cannot be identified and accessed, or partition is
identified as unformatted, partition recovery tools such as
Partition Table Doctor can be used to recover data.
Recovery Methods
• Hidden files
• Recycle bin
• Unerase wizards
• Assorted commercial programs
• Ferrofluid
– Coat surface of disk
– Check with optical microscope
– Does not work for more recent hard drives
Recovery Methods
• Scanning Probe Microscopy (SPM)
– Uses a sharp magnetic tip attached to a flexible cantilever
placed close to the surface to be analyzed, where it interacts
with the stray field emanating from the sample to produce a
topographic view of the surface
– Reasonably capable SPM can be built for about US$1400,
using a PC as a controller
– Thousands in use today
Recovery Methods
• Magnetic force microscopy (MFM)
– Recent technique for imaging magnetization patterns with
high resolution and minimal sample preparation.
– Derived from scanning probe microscopy (SPM)
– Uses a sharp magnetic tip attached to a flexible cantilever
placed close to the surface to be analyzed where it interacts
with the stray magnetic field
– An image of the field at the surface is formed by moving
the tip across the surface and measuring the force (or force
gradient) as a function of position. The strength of the
interaction is measured by monitoring the position of the
cantilever using an optical interferometer.
Recovery Methods
• Magnetic force microscopy (MFM)
Recovery Methods
• Using MFM:
– Techniques can detect data by looking at the minute
sampling region to distinctly detect the remnant
magnetization at the track edges.
– Detectable old data will still be present beside the new data
on the track which is usually ignored
– In conjunction with software, MFM can be calibrated to see
past various kinds of data loss/removal. Can also do
automated data recovery.
– It turns out that each track contains an image of everything
ever written to it, but that the contribution from each
"layer" gets progressively smaller the further back it was
made.
How to Avoid Data Recovery
• Companies, agencies, or individuals may want to ensure their
data cannot be recovered.
• Simple deletion is not good enough.
• Faced with techniques such as MFM, truly deleting data from
magnetic media is very difficult
Secure Deletion:Government Standards
• Department of Justice
– DoD 5220.22-M – Type 1 degausser, followed by type 2
degausser, then three data overwrites (character, its
complement, random)
• Problems with government standards
– Often old and predate newer techniques for both recording
and recovering data.
– Predate higher recording densities of modern drives, the
adoption of sophisticated channel coding techniques, and
the use of MFM.
– Government standard may in fact be understated to fool
opposing intelligence agencies.
Secure Deletion Techniques
• Degaussing
– Process in which the media is returned to its initial state
– Coercivity – Amount of magnetic field necessary to reduce the
magnetic induction to zero. (measured in Oersteds)
– Effectively erasing a medium to the extent that data recovery is
uneconomical requires a magnetic force ~5x the coercivity.
– US Government guidelines on media coercivity:
• Class 1: 350 Oe coercivity or less
• Class 2: 350-750 Oe coercivity.
• Class 3: over 750 Oe coercivity
– Degaussers are available for classes 1 and 2. None known for fully
degaussing class 3 media.
Secure Deletion Techniques
• Technique 2: Multiple Overwrites
• Use an overwrite scheme
– Flip each magnetic domain on the disk back and forth as
much as possible
– Overwrite in alternating patterns to expose it to an
oscillating magnetic field.
– Overwrite with “junk” data several times
• Use the lowest frequency possible for overwrites
– Penetrates deeper into the recording medium
Secure Deletion Techniques
• Peter Guttman’s overwrite scheme:
– Meant to defeat all possible recovery techniques (MFM,
etc)
– Specifies 35 different overwrites
– Not all overwrites are needed if targeting specific recovery
method (i.e. MFM)
Secure Deletion Techniques
• Extremely Extreme Physical Destruction
– Chainsaws
– Sledge hammers
– Drop in a volcano
– Place on apex of a nuclear warhead
– Multiple rounds from a high caliber firearm
• Hard Drivers are tougher than you think
High Level Formatting
Fast high level format Complete high level format
Matters Needs
Attention Before Recovery
• (1) Never operate on partition (such as write and create file)
where the data lost.
• (2) Please close any other application program when Data
Recovery Wizard 3.0 is running.
• (3) Make sure that there is no physical failure (such as
physical bad track) on the disk you are operating. If there is
any problem, please stop running Data Recovery Wizard 3.0,
and send your disk to maintenance station.
• (4) Do not save the recovered files to the original partition.
You need make sure that there is enough free space to save the
recovered data; also you can save your files to removable
devices or network devices.
Advantages And Disadvantages
• Data recovery tools can be used to
undo mistakes that you made that
resulted in lost data.
• Data consistency.
• Digital forensics
• To successfully use a data
recovery tool you will need to
determine the cause of your data
loss.
• A simple reboot cause the over
writing of data
• Data security.
• Recovery may generate
virus.
Conclusion
• From above discussion, we can say that the data recovery is
• Possible and it is not that much difficult. As we are recovering a data from
physical and logical damaging without loosing the content of data.
• The recovery data from the logically and/or physically damaged disk
drives, and the recovery of over written data is now been done with a good
amount of success. The data recovery now have become a handy tool to the
endusers as far as the logical damages are concerned, although the recovery
of data from the physically damaged drives and over written data, which is
done by the magnetic data recovery methods have still to reach at the end
users, the data recovery industry has grown through heights of technology,
that nowadays the situation is such that, data can be recovered from any
physically damaged drive untill it’s magnetic platters remain as such.And
in case of the magnetic
• Recovery also the present state-of-the-art has contributed alot to the data
recover industry that the magnetic recovery had reported recover of data
that had been over written upto 17 times.
Data recovery slide show

More Related Content

What's hot

Data recovery from storage device
Data recovery from storage deviceData recovery from storage device
Data recovery from storage device
Mohit Shah
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - NotesKranthi
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - NotesKranthi
 
Data recovery
Data recoveryData recovery
Data recovery
Suresh Hirpara
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
primeteacher32
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
Yansi Keim
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
Priya Manik
 
CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationCNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic Duplication
Sam Bowne
 
Data recovery report
Data recovery reportData recovery report
Data recovery report
tutannandi
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
Manu Mathew Cherian
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
Parsons Corporation
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - NotesKranthi
 
Forensic imaging
Forensic imagingForensic imaging
Forensic imaging
DINESH KAMBLE
 
Computer forensic
Computer forensicComputer forensic
Computer forensicbhavithd
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
abdullah roomi
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
rakesh mishra
 
Forensics of a Windows System
Forensics of a Windows SystemForensics of a Windows System
Forensics of a Windows SystemConferencias FIST
 
Memory forensics
Memory forensicsMemory forensics
Memory forensicsSunil Kumar
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
SCREAM138
 

What's hot (20)

Data recovery from storage device
Data recovery from storage deviceData recovery from storage device
Data recovery from storage device
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - Notes
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
 
Data recovery
Data recoveryData recovery
Data recovery
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationCNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic Duplication
 
Module 02 ftk imager
Module 02 ftk imagerModule 02 ftk imager
Module 02 ftk imager
 
Data recovery report
Data recovery reportData recovery report
Data recovery report
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
 
Forensic imaging
Forensic imagingForensic imaging
Forensic imaging
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
Forensics of a Windows System
Forensics of a Windows SystemForensics of a Windows System
Forensics of a Windows System
 
Memory forensics
Memory forensicsMemory forensics
Memory forensics
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 

Similar to Data recovery slide show

Data recovery system
Data recovery systemData recovery system
Data recovery system
karanbhale
 
It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery
Brian Pichman
 
Memory forensics.pptx
Memory forensics.pptxMemory forensics.pptx
Memory forensics.pptx
9905234521
 
PACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT, Security+ 2.4: Basic Forensic ProceduresPACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT, Security+ 2.4: Basic Forensic Procedures
Pace IT at Edmonds Community College
 
F1805023942
F1805023942F1805023942
F1805023942
Niro Thakur
 
Mis chapter 5
Mis  chapter 5Mis  chapter 5
WI_Symposium_Conference_2014
WI_Symposium_Conference_2014WI_Symposium_Conference_2014
WI_Symposium_Conference_2014Kevin McDaniel
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery PlanCreating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery PlanRishu Mehra
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data  Disaster  Recovery  PlanCreating And Implementing A Data  Disaster  Recovery  Plan
Creating And Implementing A Data Disaster Recovery PlanRishu Mehra
 
Disaster Recover : 10 tips for disaster recovery planning
Disaster Recover : 10 tips for disaster recovery planningDisaster Recover : 10 tips for disaster recovery planning
Disaster Recover : 10 tips for disaster recovery planning
InTechnology Managed Services (part of Redcentric)
 
Acroknight the Caribbean Data Backup solution presentation October 2013
Acroknight the Caribbean Data Backup solution presentation October 2013Acroknight the Caribbean Data Backup solution presentation October 2013
Acroknight the Caribbean Data Backup solution presentation October 2013
Steven Williams
 
Get your Lost Data Back Now - Understanding Data Recovery
Get your Lost Data Back Now - Understanding Data RecoveryGet your Lost Data Back Now - Understanding Data Recovery
Get your Lost Data Back Now - Understanding Data Recovery
Arthur King
 
An Introduction to Asset Recovery
An Introduction to Asset RecoveryAn Introduction to Asset Recovery
An Introduction to Asset Recovery
mylespilkington
 
Disaster Recovery Planning
Disaster Recovery Planning   Disaster Recovery Planning
Disaster Recovery Planning
Keystone IT
 
2.6 backup and recovery
2.6 backup and recovery2.6 backup and recovery
2.6 backup and recoverymrmwood
 
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
Felipe Prado
 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its roleSudeshna Basak
 
Never Clueless PC and server backups
Never Clueless PC and server backupsNever Clueless PC and server backups
Never Clueless PC and server backups
John Rood
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
Lalit Garg
 

Similar to Data recovery slide show (20)

Data recovery system
Data recovery systemData recovery system
Data recovery system
 
Data recovery
Data recoveryData recovery
Data recovery
 
It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery
 
Memory forensics.pptx
Memory forensics.pptxMemory forensics.pptx
Memory forensics.pptx
 
PACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT, Security+ 2.4: Basic Forensic ProceduresPACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT, Security+ 2.4: Basic Forensic Procedures
 
F1805023942
F1805023942F1805023942
F1805023942
 
Mis chapter 5
Mis  chapter 5Mis  chapter 5
Mis chapter 5
 
WI_Symposium_Conference_2014
WI_Symposium_Conference_2014WI_Symposium_Conference_2014
WI_Symposium_Conference_2014
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery PlanCreating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery Plan
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data  Disaster  Recovery  PlanCreating And Implementing A Data  Disaster  Recovery  Plan
Creating And Implementing A Data Disaster Recovery Plan
 
Disaster Recover : 10 tips for disaster recovery planning
Disaster Recover : 10 tips for disaster recovery planningDisaster Recover : 10 tips for disaster recovery planning
Disaster Recover : 10 tips for disaster recovery planning
 
Acroknight the Caribbean Data Backup solution presentation October 2013
Acroknight the Caribbean Data Backup solution presentation October 2013Acroknight the Caribbean Data Backup solution presentation October 2013
Acroknight the Caribbean Data Backup solution presentation October 2013
 
Get your Lost Data Back Now - Understanding Data Recovery
Get your Lost Data Back Now - Understanding Data RecoveryGet your Lost Data Back Now - Understanding Data Recovery
Get your Lost Data Back Now - Understanding Data Recovery
 
An Introduction to Asset Recovery
An Introduction to Asset RecoveryAn Introduction to Asset Recovery
An Introduction to Asset Recovery
 
Disaster Recovery Planning
Disaster Recovery Planning   Disaster Recovery Planning
Disaster Recovery Planning
 
2.6 backup and recovery
2.6 backup and recovery2.6 backup and recovery
2.6 backup and recovery
 
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its role
 
Never Clueless PC and server backups
Never Clueless PC and server backupsNever Clueless PC and server backups
Never Clueless PC and server backups
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
 

Recently uploaded

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 

Recently uploaded (20)

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 

Data recovery slide show

  • 1. DATA RECOVERY NAME : SHOVAN NANDI DEPARTMENT : COMPUTER SCIENCE AND ENGINEERING ROLL NO : 15800114007 REG. NO : 141580110007 YEAR : 3RD SEMESTER : 6TH
  • 2. OVERVIEW • What is Data Recovery? • The Principle of Data Recovery • How can it be used? • The Scope of Data Recovery • Techniques – Recovery Methods – Secure Deletion Matter needs attention before recovery Advantages and disadvantages Conclusion
  • 3. What is Data Recovery? It is the process of salvaging data from damaged, failed, corrupted, or inaccessible secondary storage media when it cannot be accessed normally. Recovery may be required due to physical damage to the storage device or logical damage to the file system.
  • 4. Cases of Recovery FIRE Found after a fire destroyed a 100 year old home – All data Recovered CRUSHED A bus runs over a laptop – All data recovered SOAKED PowerBook trapped underwater for two days – All data recovered
  • 5. The Principle of Data Recovery Data recovery is a process of finding and recovering data, in which there may be some risk, for no all situations can be anticipated or prearranged. It means maybe there will be some unexpected things happen. So we need reduce the danger in data recovery to the lowest: • Backup all the data in your hard disk • Prevent the equipment from being damaged again • Don’t write anything to the device on which you want to recover data • Try to get detailed information on how the data lost and the losing process • Backup the data recovered in time.
  • 6. Uses of Data Recovery • Average User: – Recover important lost files – Keep your private information private • Law enforcement: – Locate illegal data – Restore deleted/overwritten information. – Prosecute criminals based on discovered data
  • 7. The Scope of Data Recovery There are so many forms and phenomenon on data problem, we can divide the objects or scope of data recovery according to different symptoms.
  • 8. The Scope of Data Recovery System problem: Can not enter the system or the system is abnormal or computer closes down. Key file of system is lost or corrupted, there is some bad track on hard disk, the hard disk is damaged, MBR or DBR is lost, or the CMOS setting is incorrect and so on. Bad track of hardisk: logic and physical bad track. Logic bad track is mainly caused by incorrect operation, and it can be restored by software. While physical bad track is caused by physical damage, which is real damage, we can restore it by changing the partition or sector.
  • 9. The Scope of Data Recovery Files loss If files are lost because of deletion, format or Ghost clone error, files restoring tools such as Data Recovery Wizard can be used to recover data. Partition problem partition cannot be identified and accessed, or partition is identified as unformatted, partition recovery tools such as Partition Table Doctor can be used to recover data.
  • 10. Recovery Methods • Hidden files • Recycle bin • Unerase wizards • Assorted commercial programs • Ferrofluid – Coat surface of disk – Check with optical microscope – Does not work for more recent hard drives
  • 11. Recovery Methods • Scanning Probe Microscopy (SPM) – Uses a sharp magnetic tip attached to a flexible cantilever placed close to the surface to be analyzed, where it interacts with the stray field emanating from the sample to produce a topographic view of the surface – Reasonably capable SPM can be built for about US$1400, using a PC as a controller – Thousands in use today
  • 12. Recovery Methods • Magnetic force microscopy (MFM) – Recent technique for imaging magnetization patterns with high resolution and minimal sample preparation. – Derived from scanning probe microscopy (SPM) – Uses a sharp magnetic tip attached to a flexible cantilever placed close to the surface to be analyzed where it interacts with the stray magnetic field – An image of the field at the surface is formed by moving the tip across the surface and measuring the force (or force gradient) as a function of position. The strength of the interaction is measured by monitoring the position of the cantilever using an optical interferometer.
  • 13. Recovery Methods • Magnetic force microscopy (MFM)
  • 14. Recovery Methods • Using MFM: – Techniques can detect data by looking at the minute sampling region to distinctly detect the remnant magnetization at the track edges. – Detectable old data will still be present beside the new data on the track which is usually ignored – In conjunction with software, MFM can be calibrated to see past various kinds of data loss/removal. Can also do automated data recovery. – It turns out that each track contains an image of everything ever written to it, but that the contribution from each "layer" gets progressively smaller the further back it was made.
  • 15. How to Avoid Data Recovery • Companies, agencies, or individuals may want to ensure their data cannot be recovered. • Simple deletion is not good enough. • Faced with techniques such as MFM, truly deleting data from magnetic media is very difficult
  • 16. Secure Deletion:Government Standards • Department of Justice – DoD 5220.22-M – Type 1 degausser, followed by type 2 degausser, then three data overwrites (character, its complement, random) • Problems with government standards – Often old and predate newer techniques for both recording and recovering data. – Predate higher recording densities of modern drives, the adoption of sophisticated channel coding techniques, and the use of MFM. – Government standard may in fact be understated to fool opposing intelligence agencies.
  • 17. Secure Deletion Techniques • Degaussing – Process in which the media is returned to its initial state – Coercivity – Amount of magnetic field necessary to reduce the magnetic induction to zero. (measured in Oersteds) – Effectively erasing a medium to the extent that data recovery is uneconomical requires a magnetic force ~5x the coercivity. – US Government guidelines on media coercivity: • Class 1: 350 Oe coercivity or less • Class 2: 350-750 Oe coercivity. • Class 3: over 750 Oe coercivity – Degaussers are available for classes 1 and 2. None known for fully degaussing class 3 media.
  • 18. Secure Deletion Techniques • Technique 2: Multiple Overwrites • Use an overwrite scheme – Flip each magnetic domain on the disk back and forth as much as possible – Overwrite in alternating patterns to expose it to an oscillating magnetic field. – Overwrite with “junk” data several times • Use the lowest frequency possible for overwrites – Penetrates deeper into the recording medium
  • 19. Secure Deletion Techniques • Peter Guttman’s overwrite scheme: – Meant to defeat all possible recovery techniques (MFM, etc) – Specifies 35 different overwrites – Not all overwrites are needed if targeting specific recovery method (i.e. MFM)
  • 20. Secure Deletion Techniques • Extremely Extreme Physical Destruction – Chainsaws – Sledge hammers – Drop in a volcano – Place on apex of a nuclear warhead – Multiple rounds from a high caliber firearm • Hard Drivers are tougher than you think
  • 21. High Level Formatting Fast high level format Complete high level format
  • 22. Matters Needs Attention Before Recovery • (1) Never operate on partition (such as write and create file) where the data lost. • (2) Please close any other application program when Data Recovery Wizard 3.0 is running. • (3) Make sure that there is no physical failure (such as physical bad track) on the disk you are operating. If there is any problem, please stop running Data Recovery Wizard 3.0, and send your disk to maintenance station. • (4) Do not save the recovered files to the original partition. You need make sure that there is enough free space to save the recovered data; also you can save your files to removable devices or network devices.
  • 23. Advantages And Disadvantages • Data recovery tools can be used to undo mistakes that you made that resulted in lost data. • Data consistency. • Digital forensics • To successfully use a data recovery tool you will need to determine the cause of your data loss. • A simple reboot cause the over writing of data • Data security. • Recovery may generate virus.
  • 24. Conclusion • From above discussion, we can say that the data recovery is • Possible and it is not that much difficult. As we are recovering a data from physical and logical damaging without loosing the content of data. • The recovery data from the logically and/or physically damaged disk drives, and the recovery of over written data is now been done with a good amount of success. The data recovery now have become a handy tool to the endusers as far as the logical damages are concerned, although the recovery of data from the physically damaged drives and over written data, which is done by the magnetic data recovery methods have still to reach at the end users, the data recovery industry has grown through heights of technology, that nowadays the situation is such that, data can be recovered from any physically damaged drive untill it’s magnetic platters remain as such.And in case of the magnetic • Recovery also the present state-of-the-art has contributed alot to the data recover industry that the magnetic recovery had reported recover of data that had been over written upto 17 times.