ABSTRACT
The aim of this seminar paper is to examine data recovery and its security measures in computer systems. It is aimed at threating recovery data loss in hand device, hard drive failure, data corruption or accidental deleting of files.
Unfortunately, despite of constantly growing reliability of storage devices, loss of digital information remains a common phenomenon. General causes of data loss include hardware or software failures, power cuts, software malfunctions (including computer viruses) or simply human errors.
Therefore, this paper simply discuss common data loss and how it is recovered in modern computer system
INTRODUCTION
Data recovery is the process of salvaging and handling the data through the data from damaged, failed, corrupted, or inaccessible secondary storage media when it cannot be accessed normally. Often the data are being salvaged from storage media such as internal or external hard disk drives, solid-state drives (SSD), USB flash drive, storage tapes, CDs, DVDs, RAID, and other electronics. Recovery may be required due to physical damage to the storage device or logical damage to the file system that prevents it from being mounted by the host operating system (OS).
The most common data recovery scenario involves an operating system failure, accidental damage etc. (typically on a single-disk, single-partition, single-OS system), in which case the goal is simply to copy all wanted files to another disk. This can be easily accomplished using a Live CD, many of which provide a means to mount the system drive and backup disks or removable media, and to move the files from the system disk to the backup media with a file manager or optical disc authoring software. Such cases can often be mitigated by disk partitioning and consistently storing valuable data files (or copies of them) on a different partition from the replaceable OS system files. (Charles et al, 2006)
Another scenario involves a disk-level failure, such as a compromised file system or disk partition, or a hard disk failure. In any of these cases, the data cannot be easily read. Depending on the situation, solutions involve repairing the file system, partition table or master boot record, or hard disk recovery techniques ranging from software-based recovery of corrupted data, hardware-software based recovery of damaged service areas (also known as the hard drive's "firmware"), to hardware replacement on a physically damaged disk. If hard disk recovery is necessary, the disk itself has typically failed permanently, and the focus is rather on a one-time recovery, salvaging whatever data can be read.
In some case, files have been "deleted" from a storage medium. Typically, the contents of deleted files are not removed immediately from the drive; instead, references to them in the directory structure are removed, and the space they occupy is made available for later overwriting. In the meantime, the original file contents remain, often in a number of disconnected fragments, and may be recoverable.
The term "data recovery" is also used in the context of forensic applications or espionage, where data which have been encrypted or hidden, rather than damaged, are recovered.
(2014, 12). Data Recovery.. ProjectStoc.com. Retrieved 12, 2014, from https://projectstoc.com/read/5705/data-recovery-4189
"Data Recovery." ProjectStoc.com. 12 2014. 2014. 12 2014 <https://projectstoc.com/read/5705/data-recovery-4189>.
"Data Recovery.." ProjectStoc.com. ProjectStoc.com, 12 2014. Web. 12 2014. <https://projectstoc.com/read/5705/data-recovery-4189>.
"Data Recovery.." ProjectStoc.com. 12, 2014. Accessed 12, 2014. https://projectstoc.com/read/5705/data-recovery-4189.
- Related Works
- Dynamic Signature Verification Using Pattern Recognition
- Design And Construction Of A Cassava Grating Machine
- Design And Implementation Of A Computer Based Seaport Billing System (a Case Study Of Nigerian Port Authority Lagos)
- Design And Implementation Of A Computer Based Child Care Information System A Case Study Of Inicef Enugu
- Itp: An Image Transport Protocol For The Internet
- Design And Implementation Of A Computerized Sales Order Accounting System
- Modus Operandi Of Search Engines
- Design And Implementation Of A Computerised Market Information System (a Case Study Of 9th Mile Corner Ngwo)
- Design And Implementation Of Webified Internet Relay Chat (case Study Of Dhl Enugu)
- Design And Implementation Of Tcp/ip Chat Client Server Option And Challenges