ABSTRACT
The aim of this seminar paper is to examine data recovery and its security measures in computer systems. It is aimed at threating recovery data loss in hand device, hard drive failure, data corruption or accidental deleting of files.
Unfortunately, despite of constantly growing reliability of storage devices, loss of digital information remains a common phenomenon. General causes of data loss include hardware or software failures, power cuts, software malfunctions (including computer viruses) or simply human errors.
Therefore, this paper simply discuss common data loss and how it is recovered in modern computer system
INTRODUCTION
Data recovery is the process of salvaging and handling the data through the data from damaged, failed, corrupted, or inaccessible secondary storage media when it cannot be accessed normally. Often the data are being salvaged from storage media such as internal or external hard disk drives, solid-state drives (SSD), USB flash drive, storage tapes, CDs, DVDs, RAID, and other electronics. Recovery may be required due to physical damage to the storage device or logical damage to the file system that prevents it from being mounted by the host operating system (OS).
The most common data recovery scenario involves an operating system failure, accidental damage etc. (typically on a single-disk, single-partition, single-OS system), in which case the goal is simply to copy all wanted files to another disk. This can be easily accomplished using a Live CD, many of which provide a means to mount the system drive and backup disks or removable media, and to move the files from the system disk to the backup media with a file manager or optical disc authoring software. Such cases can often be mitigated by disk partitioning and consistently storing valuable data files (or copies of them) on a different partition from the replaceable OS system files. (Charles et al, 2006)
Another scenario involves a disk-level failure, such as a compromised file system or disk partition, or a hard disk failure. In any of these cases, the data cannot be easily read. Depending on the situation, solutions involve repairing the file system, partition table or master boot record, or hard disk recovery techniques ranging from software-based recovery of corrupted data, hardware-software based recovery of damaged service areas (also known as the hard drive's "firmware"), to hardware replacement on a physically damaged disk. If hard disk recovery is necessary, the disk itself has typically failed permanently, and the focus is rather on a one-time recovery, salvaging whatever data can be read.
In some case, files have been "deleted" from a storage medium. Typically, the contents of deleted files are not removed immediately from the drive; instead, references to them in the directory structure are removed, and the space they occupy is made available for later overwriting. In the meantime, the original file contents remain, often in a number of disconnected fragments, and may be recoverable.
The term "data recovery" is also used in the context of forensic applications or espionage, where data which have been encrypted or hidden, rather than damaged, are recovered.
(2014, 12). Data Recovery.. ProjectStoc.com. Retrieved 12, 2014, from https://projectstoc.com/read/5705/data-recovery-4189
"Data Recovery." ProjectStoc.com. 12 2014. 2014. 12 2014 <https://projectstoc.com/read/5705/data-recovery-4189>.
"Data Recovery.." ProjectStoc.com. ProjectStoc.com, 12 2014. Web. 12 2014. <https://projectstoc.com/read/5705/data-recovery-4189>.
"Data Recovery.." ProjectStoc.com. 12, 2014. Accessed 12, 2014. https://projectstoc.com/read/5705/data-recovery-4189.
- Related Works
- Design And Implementation Of Computerized Information System For Small Small Business Enterprise A Case Study Of Enugu Urban.
- Fuzzy Control Model Optimization For Behavior-consistent Traffic Routing Under Information Provision
- Design And Implementation Of Workflow Mining: Discovering Process Models From Event Logs
- Smart Knowledge Provider
- Design And Implementation Of A Computerised Information System For A Small Business Enterprise (case Study Of Texaco Filling Station)
- Remote Electricity Billing System Automation And Implementation -ejb (a Case Study Of Nepa)
- Dynamic Signature Verification Using Pattern Recognition
- The Design And Implementation Of A Software For Automobile Insurance Scheme In Nigeria. A Case Study Of Motor Insurance Departmetn Of Universal Insurance Company Ltd Enugu.
- Find And Replace Utility
- Error Detection And Correction In Data Communications Using Parity Bit And Cyclic Redundancy Check
