Data Recovery Techniques By Danny Seltzer and Evan Hollander.

Slides:



Advertisements
Similar presentations
Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
Advertisements

Utility program + driver program Thomas Wat 4D (21)
Backing up and Archiving Data Chapter 1. Introduction This presentation covers the following: – What is backing up – What is archiving – Why are both.
Backing Up Your Computer Hard Drive Lou Koch June 27, 2006.
1 X-Ways Security: Permanent Erasure Supervised By: Dr. Lo’ai Tawalbeh Prepared By :Murad M. Ali.
Section 5a Types of Storage Devices.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Everything your business needs to know but probably doesn’t.
If you use your computer more than a few hours per day, we suggest you not to turn off your computer at the end of the day. Instead turn off only the.
1 CSIS 7102 Spring 2004 Lecture 8: Recovery (overview) Dr. King-Ip Lin.
Princeton PC Users Group Hard Drive Disaster! By Paul Kurivchack March 14, 2005.
1 Pertemuan 23 Contingency Planning Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Data Recovery Mitchell DawsonChris Forgie Jon Davis Steve Tauber Jon Davis Steve Tauber CSSE 592/492 Computer Forensics May 7 th, 2003.
Preservasi Informasi Digital.  It will never happen here!  Common Causes of Loss of Data  Accidental Erasure (delete, power, backup)  Viruses and.
Format Scandisk Defragmentation Antivirus Compression Software
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Backup and Recovery Part 1.
Computer Storage Devices Principles of Information Technology Lytle High School Click to continue.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Software utilities Gladys Nzita-Mak. Disk defragmentation Disk defragmentation makes computers run efficiently. When you save, change or delete files.
C AMBRIDGE N ATIONALS - BP2 How Information and data can be stored on portable devices.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
 FILE S SYSTEM  DIFFERENT FILE SYSTEMS  FILE SYSTEM COMPONENTS  FILE OPERATIONS  LOG STRUCTERD FILE SYSTEM  FILE EXAMPLES.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
How Hard Disks Work. Hard disks were invented in the 1950s. They started as large disks up to 20 inches in diameter holding just a few megabytes. They.
1 Chapter 12 File Management Systems. 2 Systems Architecture Chapter 12.
Guide to Linux Installation and Administration, 2e 1 Chapter 9 Preparing for Emergencies.
Dr.Backup Online Backup Service (888) (toll free)
COMPUTER CARE & MAINTENANCE. Protecting Your Computer From Damage Like any kind of equipment, your computer requires care and maintenance to run smoothly.
INFO1 – Practical problem solving in the digital world
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Data Recovery Techniques Florida State University CIS 4360 – Computer Security Fall 2006 December 6, 2006 Matthew Alberti Horacesio Carmichael.
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
VIRUS Is a computer program that can copy itself and infect a computer without permission or knowledge of the user or is a program or piece of code that.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Mark A. Magumba Storage Management. What is storage An electronic place where computer may store data and instructions for retrieval The objective of.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
Basic Input/Output System
Computer security By Isabelle Cooper.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Chapter 6 Protecting Your Files. Protecting Your Files FAQs: – What should I know about losing data? – How can I protect my files from viruses? – How.
Page 1 of 38 Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Please Note: Information contained in.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Physical Security Concerns for LAN Management By: Derek McQuillen.
Hyper-V Recovery Software Ideal Application to Get Data from VHD v2.1.
As we all know that many unexpected incidents can lead to data loss on your iPhone, such as iPhone stolen, damaged or got lost, accidental deletion, reset,
How to Recover Data from SanDisk Memory Card ?. 2 Sources:
Photo recovery from water damaged XD memory card recovery-from-water-damaged-xd-memory-card.
Principles of Magnetic Storage. Define Electromagnetism Flux FM encoding MFM encoding RLL.
Chapter 6 Protecting Your Files
File-System Management
Alicia A. Coon COSC 480 October 27, 2006
Hardware Components By Charlie Leivers.
Disks.
Normal deletion Shift deletion
Backup and restoration of data, redundancy
Lesson 9 Types of Storage Devices.
Presentation transcript:

Data Recovery Techniques By Danny Seltzer and Evan Hollander

NOT a Data Recovery Technique

What is Data Loss? Data has accidentally been erased or data control structures have been overwritten. Data has accidentally been erased or data control structures have been overwritten. Data has been corrupted or made inaccessible. Data has been corrupted or made inaccessible. Data is unable to be accessed from a previous functioning computer system or backup. Data is unable to be accessed from a previous functioning computer system or backup.

Common Computer Problems Computer won’t boot up Computer won’t boot up Applications that are unable to run or load data Applications that are unable to run or load data Hard drive crashes Hard drive crashes Corrupt files or data Corrupt files or data Accidental reformatting of partitions Accidental reformatting of partitions Inaccessible drives and partitions Inaccessible drives and partitions Media surface contamination and damage Media surface contamination and damage

What Causes Data Loss? Sabotage Sabotage Natural Disaster Natural Disaster Hardware Error Hardware Error Virus Attack Virus Attack Human Error Human Error Intentional deletion Intentional deletion Accidental overwriting of files Accidental overwriting of files Software Corruption Software Corruption

What Causes Data Loss?

How to Prevent Data Loss Don’t upgrade hardware or software without having a backup Don’t upgrade hardware or software without having a backup Physically secure your system from intruders Physically secure your system from intruders Use firewalls and virus protection Use firewalls and virus protection Be prepared for physical disasters Be prepared for physical disasters

Things to Know About Data Loss Data loss is disastrous at home, but for companies it causes setbacks in time and money. Data loss is disastrous at home, but for companies it causes setbacks in time and money. “93% of companies that experience data loss for more than 10 days file for bankruptcy within one year of the disaster.” “93% of companies that experience data loss for more than 10 days file for bankruptcy within one year of the disaster.” If the data loss recovery is dealt with quickly or the necessary precautions are taken prior to any problem, the company could retrieve the data more easily or not experience a problem at all. If the data loss recovery is dealt with quickly or the necessary precautions are taken prior to any problem, the company could retrieve the data more easily or not experience a problem at all.

Data Recovery The majority of data loss situations are recoverable. The majority of data loss situations are recoverable. Computer storage systems may fail, but the data stored on them is not always completely lost. Computer storage systems may fail, but the data stored on them is not always completely lost. There are occasions when damage to data is permanent and complete data recovery is not possible. However, some data is usually always recoverable. There are occasions when damage to data is permanent and complete data recovery is not possible. However, some data is usually always recoverable. Data recovery professionals can recover data from crashed hard drives, operating systems, storage devices, servers, desktops, and laptops using various proprietary data recovery tools and techniques. Data recovery professionals can recover data from crashed hard drives, operating systems, storage devices, servers, desktops, and laptops using various proprietary data recovery tools and techniques.

Data Recovery Tips DO’s DO’s Backup your data frequently. Backup your data frequently. If you believe there is something wrong with your computer shut it down, do not continue to power up because you may do more damage. If you believe there is something wrong with your computer shut it down, do not continue to power up because you may do more damage. If you here a clunk, clunk sound when you power up the drive, shut down! Do not panic nor turn the power button on and off. If you here a clunk, clunk sound when you power up the drive, shut down! Do not panic nor turn the power button on and off. Package the drive properly when you send it in to a data recovery specialist. You can cause additional damage to the hard drive if it is poorly packaged. Package the drive properly when you send it in to a data recovery specialist. You can cause additional damage to the hard drive if it is poorly packaged. DON’TS Do not ever assume that data recovery is impossible; even in the worst cases, such as natural disasters data recovery specialists have been able to retrieve valuable data. Never remove the cover from the hard drive; this will only cause further damage. Do not rest your computer on a moveable object or piece of furniture. Shock and vibration can result in serious damage to the hard drive. Do not subject the drive to extreme temperatures changes both hot and cold. In the case where a drive has been exposed to water, fire or even smoke do not try to power up.

Data Recovery Techniques Use of software to recover data Use of software to recover data Use of machines to recover data Use of machines to recover data

Software Data Extraction Data extraction is the process of moving data off of the imaged drive to another destination location. Data extraction is the process of moving data off of the imaged drive to another destination location. Data extraction software scans sectors of the hard drive and restructures the file system either in memory or another hard drive. Data extraction software scans sectors of the hard drive and restructures the file system either in memory or another hard drive. The software can be used to copy the recoverable data to a destination location. The software can be used to copy the recoverable data to a destination location.

Software Recovery Data loss can occur because the hard drive may have problems accessing the data it contains at a software or logical level. Data loss can occur because the hard drive may have problems accessing the data it contains at a software or logical level. By making a complete sector copy (an exact copy including all deleted information) of the hard drive, using a program such as Norton GHOST, most data recovery programs search for deleted MFT (Master File Table) entries to undelete files. By making a complete sector copy (an exact copy including all deleted information) of the hard drive, using a program such as Norton GHOST, most data recovery programs search for deleted MFT (Master File Table) entries to undelete files. If the MFT is corrupt or defective, this method will not work. Some data recovery programs will ignore the MFT and search all of the unallocated clusters to try to find and recover files. If the MFT is corrupt or defective, this method will not work. Some data recovery programs will ignore the MFT and search all of the unallocated clusters to try to find and recover files.

Data Recovery The user may send a failed hard disk drive to a private data recovery company that offers secure and confidential data recovery. The user may send a failed hard disk drive to a private data recovery company that offers secure and confidential data recovery. The data recovery company will carefully perform part replacement of the heads, spindle motor and base casting, the electronics board, etc. in a clean room environment. The data recovery company will carefully perform part replacement of the heads, spindle motor and base casting, the electronics board, etc. in a clean room environment. Part replacement has historically been successful for data recovery about 40%-60% of the time. Part replacement has historically been successful for data recovery about 40%-60% of the time.

Data Recovery When data is written to a medium, the head sets the polarity of most, but not all of the magnetic domains. When data is written to a medium, the head sets the polarity of most, but not all of the magnetic domains. When a 1 is written to disk the media records a 1, and when a 0 is written the media records a 0. However the actual effect is closer to obtaining a 0.95 when a 0 is overwritten with a 1, and a 1.05 when a 1 is overwritten with a 1. When a 1 is written to disk the media records a 1, and when a 0 is written the media records a 0. However the actual effect is closer to obtaining a 0.95 when a 0 is overwritten with a 1, and a 1.05 when a 1 is overwritten with a 1.

Data Recovery Normal disk circuitry is set up so that both these values are read as ones, but using specialized circuitry it is possible to work out what previous "layers" contained. Normal disk circuitry is set up so that both these values are read as ones, but using specialized circuitry it is possible to work out what previous "layers" contained. The recovery of at least one or two layers of overwritten data isn't too hard to perform by reading the signal from the analog head electronics with a high- quality digital sampling oscilloscope, downloading the sampled waveform to a PC, and analyzing it in software to recover the previously recorded signal. The recovery of at least one or two layers of overwritten data isn't too hard to perform by reading the signal from the analog head electronics with a high- quality digital sampling oscilloscope, downloading the sampled waveform to a PC, and analyzing it in software to recover the previously recorded signal.

Data Recovery Techniques Scanning Probe Microscopy (SPM) A technique that is used to image and measure surfaces at the atomic level. A technique that is used to image and measure surfaces at the atomic level. Scans an atomically sharp probe over a surface which produces a 3D topographic image of the surface at the atomic scale. Scans an atomically sharp probe over a surface which produces a 3D topographic image of the surface at the atomic scale.

Data Recovery Techniques Magnetic Force Microscopy (MFM) MFM (Magnetic Force Microscopy) is a new technique which images the spatial variation of magnetic forces on a sample surface. MFM (Magnetic Force Microscopy) is a new technique which images the spatial variation of magnetic forces on a sample surface. MFM is derived from scanning probe microscopy (SPM) and uses a sharp magnetic tip attached to a flexible cantilever for analysis. MFM is derived from scanning probe microscopy (SPM) and uses a sharp magnetic tip attached to a flexible cantilever for analysis. An image of the field at the surface is formed by moving the tip across the surface and measuring the force. An image of the field at the surface is formed by moving the tip across the surface and measuring the force.

Magnetic Force Microscopy (MFM) Detectable old data will be present beside new data on the track which is usually ignored. Detectable old data will be present beside new data on the track which is usually ignored. Together with software, MFM can see past various kinds of data loss/removal. Together with software, MFM can see past various kinds of data loss/removal. Each track contains an image of everything ever written to it, but each layer gets progressively smaller the earlier it was written. Each track contains an image of everything ever written to it, but each layer gets progressively smaller the earlier it was written.

Magnetic Force Microscopy (MFM) MFM looks at the minute sampling region to detect remnant magnetization at track edges. MFM looks at the minute sampling region to detect remnant magnetization at track edges.

MFM image showing the bits of a hard disk

Data Recovery Techniques Scanning Tunneling Microscopy (STM) STM (Scanning Tunneling Microscopy) is a more recent variation of MFM which uses a probe tip typically made by plating nickel onto a pre-patterned surface. STM (Scanning Tunneling Microscopy) is a more recent variation of MFM which uses a probe tip typically made by plating nickel onto a pre-patterned surface. The probe is scanned across the surface that is to be analyzed. STM measures a weak electrical current flowing between the tip and the sample. The image is then generated in the same way as MFM. The probe is scanned across the surface that is to be analyzed. STM measures a weak electrical current flowing between the tip and the sample. The image is then generated in the same way as MFM.

Summary Individuals or companies may experience data loss at any time for many reasons. Individuals or companies may experience data loss at any time for many reasons. There are various steps that should be implemented to help prevent data loss. There are various steps that should be implemented to help prevent data loss. Data loss can be very costly and very upsetting. Data loss can be very costly and very upsetting. There are several data recovery techniques that have proven to be successful or partially successful in recovering data. There are several data recovery techniques that have proven to be successful or partially successful in recovering data. Utilizing qualified professional data recovery specialists will aid in the degree of success of data recovery. Utilizing qualified professional data recovery specialists will aid in the degree of success of data recovery.

Bibliography html html html html _del.html _del.html _del.html _del.html