Data Deletion and Recovery. Data Deletion  What does data deletion mean in your own words?

Slides:



Advertisements
Similar presentations
Backing up and Archiving Data Chapter 1. Introduction This presentation covers the following: – What is backing up – What is archiving – Why are both.
Advertisements

Computer Basics Hit List of Items to Talk About ● What and when to use left, right, middle, double and triple click? What and when to use left, right,
Backing Up Your Computer Hard Drive Lou Koch June 27, 2006.
1 X-Ways Security: Permanent Erasure Supervised By: Dr. Lo’ai Tawalbeh Prepared By :Murad M. Ali.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Lesson 3: File Management. 2 Learning Objectives After studying this lesson, you will be able to:  Browse files on the computer  Open files from a folder.
Lesson 13 PROTECTING AND SHARING DOCUMENTS
 When you receive a new you will be shown a highlighted in yellow box where your can be found  To open your new just double click.
®® Microsoft Windows 7 for Power Users Tutorial 10 Backing Up and Restoring Files.
Source XP vs Windows 7 XPWin 7.
Operating Systems Day 3. Changing Date & Time 1.Double click on digital clock on the notification area of a task bar (Click start button, Click control.
Introduction to Computers II A Presentation of the Elmhurst Public Library.
KEEP YOUR COMPUTE SAFE AND HOW TO FIX IT 1. OBJECTIVE Keep your computer safe. -Not about spam, phishing or browser hijacks Designed for the non-geek.
Chapter 4: Operating Systems and File Management 1 Operating Systems and File Management Chapter 4.
Lesson 9 Windows Management
Introduction to Computers I A presentation of the Elmhurst Public Library.
Chromium OS is an open-source project that aims to build an operating system that provides a fast, simple, and more secure computing experience for people.
Chapter 4 Solving Data Backup Challenges Prepared by: Khurram N. Shamsi.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
WINDOWS Part 1 – Start Up Basics
Attack Plan Alex. Introduction This presents a step-by-step attack plan to clean up an infected computer This presents a step-by-step attack plan to clean.
Computer security By Shreya Houji. VirusesViruses.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
 You always need to have the latest anti- virus software so that you can prevent picking up unwanted virus’.  To prevent receiving junk mail, being.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
XP New Perspectives on Windows 2000 Professional Windows 2000 Tutorial 2 1 Microsoft Windows 2000 Professional Tutorial 2 – Working With Files.
Lesson 12: Using the Recycle Bin deleting files or folders what the Recycle Bin is restoring files from the Recycle Bin emptying the Recycle Bin identifying.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
Computer Security... By Kate Robinson 8P Viruses Hackers Backups Stuxnet Gary Mckinnon.
 When you receive a new you will be shown a highlighted in yellow box where your can be found  To open your new just double click.
Computer Safety Sid Holder 8k Viruses Hacking Backing Up.
CS101 Storage Information Storage The zeros and ones in the input devices, output devices and process devices are in _______ form and are lost when the.
Getting To Know Computers COMPUTER BASICS. WHAT IS A COMPUTER? A computer is an electronic device that manipulates information, or “data.” It has the.
Chapter 4. Drive – The largest storage area. The C: Drive is usually the hard drive, but you can have other drives on your network or on a separate device.
What is a Virus? A virus is something that you get in any shape or form. You could receive an that has an interesting title, but not know who is.
Complete System Backup Microsoft Acronis TimeMachine (Mac)
By Liam Wright Manga comic group Japan SAFETY on your computer.
File Management In this exercise the A drive is used as an example. If you are using another storage device, substitute that drive letter (D, E, F…) where.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Matthew Glenn AP2 Techno for Tanzania This presentation will cover the different utilities on a computer.
The desktop (overview) Working with desktop icons The desktop is the main screen area that you see after you turn on your computer and log on to Windows.
IT-IDT-5 Understand, communicate, and adapt to a digital world. File Management.
Page 1 of 38 Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Please Note: Information contained in.
What is Reformatting? Reformatting the disk means to, refresh the hard drive to a new state. A full format permanently erases everything on the disk as.
SQL SERVER 2008 Installation Guide A Step by Step Guide Prepared by Hassan Tariq.
COMPUTER SYSTEM TOOLS. SCANDISK MICROSOFT UTILITY PURCHASED FROM NORTON, WHICH IS NOW SYMANTEC; INCLUDED WITH MS-DOS 6.2 AND ON AS WELL AS ALL VERSIONS.
XP New Perspectives on Microsoft Windows XP Tutorial 2 1 Microsoft Windows XP Working with Files Tutorial 2.
Photo Recovery How to Get Back your Lost Photos Easily?
Advance startup options Shift Restart. Restart options.
How to Recover Data from SanDisk Memory Card ?. 2 Sources:
Photo recovery from water damaged XD memory card recovery-from-water-damaged-xd-memory-card.
Digital Literacy Introduction to Computers Unit 1, Lesson 1.
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
Lesson 13 PROTECTING AND SHARING DOCUMENTS
Chapter 6 Protecting Your Files
The concealed recovery partition on your HP computer allows you to restore your business machine, lets you restore your business machine back to its factory.
CS101 Booting A Computer.
Microsoft Windows 7 - Illustrated
Understanding File Management
Introduction To Computers
Introduction to Computers
Lesson 13 PROTECTING AND SHARING DOCUMENTS
Understanding File Management
Microsoft Windows 2000 Professional
Normal deletion Shift deletion
New Perspectives on Windows XP
COMP1321 Digital Infrastructures
3.1 Basic Concept of Directory and Sub-directory
Microsoft Office Illustrated Fundamentals
Presentation transcript:

Data Deletion and Recovery

Data Deletion  What does data deletion mean in your own words?

 Data erasing - a method of overwriting the data on a hard disk or other digital device. Data Deletion  There are different levels of deletion, ranging from pressing the delete button or sticking something in the recycle bin to physically destroying the disk.

 Example 1  McDonald’s wants to throw out an old register hard drive, so they decide that all they have to do is throw everything into the recycle bin on it and click delete. Is this a true way to delete data (and a secure way), or can someone get the hard drive and get the data back? Data Deletion

 Example 2  Best Buy wants to throw out some old hard drives of their own, so they decide to step it up a notch. They don’t use the recycle bin and the delete button, rather they decide that they will just change all the 1s to 0s and 0s to 1s. Is this a true way to delete data (and secure way), or can someone get data from it? Data Deletion

 Example 3  Microsoft wants to throw out some hard drives themselves, so they decide that instead of the previous methods, they will do a full disk overwrite. Is this a true way to delete data (and secure way)? Data Deletion

 Example 4  The DOD wants to get rid of some hard drives, so it takes it one step further. After doing all the wipes like Microsoft, they damage the disc in some way to make it totally unrecoverable. For example, they may take the discs to a high powered magnet or just simply take a powered screwdriver to it and put holes in it. Is this a true way to delete data (and secure way)? Data Deletion

 Data Deletion Activity  For this activity, let’s explore the different ways to delete data.  You can do this by yourself or in groups.  Create 3 different text files, and add 1-2 sentences in each. Name each one differently.  After you have saved each file, delete each one in one of the 3 ways:  Delete it with the delete button  Stick it in the recycle bin and empty it  Use a program to ‘secure’ delete it Data Deletion

Data Recovery  Data recovery - the process of getting data back from damaged, corrupted, deleted, or inaccessible storage devices.  Places it’s used/needed:  Deleted data, both accidental and inteninal  Disc failure or computer failure  Power failure causes data corruption

Data Recovery  Data recovery is used in computer forensics to find data for police, government agencies, etc. to find evidence from perpetrators  Data recovery is used to help normal people who have computer problems and lose data that they need for work or even personal use.

Data Recovery  Example 1  In the case of McDonald’s from above, all you have to do is use software to restore the pointers to the data, and presto, access to those credit cards and other company info that they thought they deleted.

 Example 2  In the case of Best Buy, you can use software to recover the data, although not all software will do it. You might also have to know the order that they zeroed out and one’d out the hard drive. Data Recovery

 Example 3  In Microsoft’s case, you might not be able to recover the data. There might be a program out there that can do it, but depending on how many times Microsoft did their scrubbing over the data, and how complex they made it, it could be impossible to recover the data. Good job Microsoft!

Data Recovery  Example 4  In the DOD’s case, recovery is impossible. Not only did they scrub it, they also took it the extra mile and physically destroyed the disc to make sure you couldn’t recover any data from it.

Data Recovery  Example 5 – recovery software example  For this example, we will do a step by step through a program called autopsy on kali linux  1. To start things off, let’s open up a puppy linux vm and delete some data (we’ll make 3 files, and delete them in 3 ways, one by just pressing delete after it’s been saved, one by sending it to the recycle bin and then emptying the recycle bin, and one by using a program on the OS called shred).

Data Recovery  Before we continue, we must allow the vm access to the flash drive, follow these steps (after shutting down all vms): a) connect the USB drive and get to the settings for your Virtual Machine (remember that you cannot access these settings with the VM it running) Atapi-6 bridge). You'll see that the information below is populated. Leave remote to NO and CLICK OK. I left "Enable 2.0 support" checked also. c) boot the VM. After everything is up just unplug and replug the device and VB will grab it before OS X does.

Data Recovery  2. Ok, now that we’ve deleted all 3, let’s make a backup of this vm so that we can recover the data. First we’ll need to shut down the vm, then we’ll open it back up with a live cd of kali to back up the vm so as to have a copy to recover from. (Since we shut down the device to get the flash drive to connect, we should be good.)

Data Recovery  3. Now that we have our backup, let’s boot up into kali and start the recovery process.  Once kali has booted up, go to Applications -> Kali Linux -> Forensics - > Digital Forensics -> autopsy.  After clicking that, a terminal window pops up. Right click the link in there, and tell it to open link, which opens a browser with the program running.  Next, follow the steps on this website to create a new case: forensics.sans.org/blog/2009/05/11/a-step-by-step-introduction-to-using- the-autopsy-forensic-browserhttp://digital- forensics.sans.org/blog/2009/05/11/a-step-by-step-introduction-to-using- the-autopsy-forensic-browser

Data Recovery  Group Data Recovery Activity  Ok, now that we’ve had a step by step on how to do autopsy, let’s get your groups to recover the data you deleted earlier.  Going through the steps from the example, back up the puppy linux vm, then open a case in autopsy and see if you can recover the data.  List which of the 3 you can get and which you can’t.  After all groups are done, we’ll discuss which we could get and which we couldn’t get.