Zombie Hard disks Data from the Living Dead
|
|
|
- Audrey Craig
- 10 years ago
- Views:
Transcription
1 Zombie Hard disks Data from the Living Dead Iain Sutherland 1,3, Gareth Davies 1, Andy Jones 2, 3, 4, Andrew J.C. Blyth 1 1 University of Glamorgan Information Security Research Group Pontypridd, Wales, United Kingdom [email protected], [email protected] 2 Centre for Information & Security Systems Research, BT United Kingdom [email protected] 3 secau - Security Research Centre Edith Cowan University Perth, Western Australia 4 Khalifa University of Science, Technology & Research (KUSTAR) Sharjah, UAE Abstract There have been a number of studies conducted in relation to data remaining on disks purchased on the second hand market. A large number of these studies have indicated that a proportion of these disks contain a degree of residual data placed on the drive by the original owners. The Security Research Centre at BT has sponsored a residual data study over the last five years examining disks sourced around the globe, in the UK, USA, Germany France and Australia. In 2008 as part of a 5 year study, Glamorgan University in conjunction with Edith Cowan University in Australia, Longwood University in Virginia USA and the BT Security Research Centre completed the fourth annual disk study aimed at assessing the volume and nature of information that remains on computer hard disks offered for sale on the second hand market. One of the main findings of the study was the high proportion of disks that are sold in a non-functioning state. As in both previous and following years a percentage of the hard disks examined in the 2008 study failed the imaging process and were marked as faulty. This paper describes further analysis of a number of these faulty drives from the UK sample set of the 2008 study. This paper details the analysis of non-functioning disks supplied to the University of Glamorgan to determine the ease with which data can be recovered from these drives using specialist recovery tools. It discusses implications for both computer forensics and information security practices and procedures. Keywords Forensics, disk disposal, data recovery INTRODUCTION There are numerous studies examining the way in which data can be recovered from computer hard disks for which the correct disposal action has not been taken (Garfinkel (2003), Sutherland (2006). During the last three years the University of Glamorgan in conjunction with Edith Cowan University in Australia, Longwood University in the USA and BT, has participated in a study of the data that remained on second hand hard disks (Jones et al, 2005, 2006, 2007, 2008 and 2010). The disk study project had been conducted in order to obtain an understanding of the amounts and types of information that remained on disks that had been offered for sale on the second hand market through various channels including online auctions. The methodology employed for the disk study involved the purchase of a sample set of disks, in the case of the UK set in 2008 this was in the order of 133 disks, obtained from computer fairs, computer auctions or via online auction sites. The disks were purchased individually or in small batches, discretely obtained by a number of buyers. These disks were acquired by the project sponsor British Telecommunications (BT) Limited. The disks were a mixture of the form factors (the 3.5 inch desktop or 2.5 inch laptop drives) although a few smaller versions commonly used in devices such as the Apple ipod were also present in the sample. The disks were then supplied blind to the researchers responsible for the imaging and analysis with no indication of where they had been sourced and identified only by a manufacturers label and a unique sequential serial number. 156 P age
2 In the disk study, the disk drives were forensically analysed with the objective of determining whether the disks had been effectively cleansed of data or whether they still contained information that was either visible or easily recoverable, and if there was sufficient information to identify an organisation or individual. The research to date has indicated that a large proportion of the disks examined that could be accessed, still contained information pertaining to a previous owner of the disk. The information recovered could be considered of a sensitive nature to the original organisation or individual. The analysis used standard forensic good practice procedures as defined in the UK Association of Chief Police Officers (ACPO) Good Practice Guide for Computer-Based Electronic Evidence 45. Analysis was performed on a forensic copy of the drive, with the original disk being securely stored. The analysis methods used standard commercial tools and depending on the disk recovered information either from a file system remaining on the drive or from unallocated space by methods such as data carving. The 2008 research also highlighted that a number of the disks failed during the imaging process; of the 133 disks analysed at Glamorgan for the 2008 disk study a total of 57 disks (44.19%) of the disks were faulty in some way. The figure of 57 disks does not include those that successfully imaged, but with a high rate of errors, which would be replaced with zeros in the image. The figure of 57 disks represents the number that failed to complete the imaging process using either Encase or FTK Imager, the main commercial forensic tools in use in the University of Glamorgan Forensics Laboratory. Prior to discussing the analysis and recovery of some these disks and considering the implications to computer forensics we outline some of the key features of hard disk technology and possible failures. HARD DISK TECHNOLOGY The hard disk remains the most popular form of digital storage media used in computer systems. The disk drive may be housed either within the system unit, a removable caddy or an external housing connected by either Firewire or USB. Current conventional computer hard disks are electro-mechanical devices. In addition to the Printed Circuit Board (PCB) the drive contains a number of moving parts: one or more metal, ceramic or glass platters coated with a magnetic thin film oxide (the data storage area within the disk), voice coils, motor, mountings and an armature with a separate head assembly for each disk surface. A specific sector (the smallest addressable unit) can be addressed by using the cylinder address (C) the Head (H) and the Sector (S). These mechanical components interact with very small tolerances and consequently are susceptible to damage from sudden movements, for instance the type of shock that occurs when a disk is dropped, even a relatively short distance. Some of the latest generation of disks contain integrated sensors on the PCB that detect sudden movements and automatically park the read/write heads in the event of an accidental fall. Once the heads are in the parked position some disks are rated to withstand shocks of up to 350G (Maxtor DiamondMax 20). Disks are therefore surprising robust in some cases but fragile in other cases. Work conducted by Schroeder & Gibson (2007) suggested that disk independent factors in the form of operating conditions, usage and environmental factors affect the rate of failure rather than component failures resulting from the use of different types of disks, a conclusion supported by Pinheiro (2007). Problems may result from either mechanical or chemical failure, common issues highlighted in table 1 below. Failure Class Mechanical failures Example Failure Spindle jam Head crash Description This may result due to wear and tear on a pre-existing manufacturing defect Semi-defective spindle bearing. Insufficient airflow to maintain an air bearing between the head and the disk platter. This can occur due to a high impact during operation or a power failure. This can commonly occur as the disk powers down and result in the head failing to part correctly Physical damage Impact/ Shock Incorrect handling and storage can cause damage to the disk. Physical damage to the circuit board can also result from a harsh working environment (Schroeder 2005) Disk contamination Disks operate using very fine tolerances. The disk head travels over the surface of the drive at a distance of of an inch. Opening a disk in normal conditions can result in a degree of contamination that will eventually result in drive failure. 45 Association of Chief Police Officers Good Practice Guide for Computer-Based Electronic Evidence, P age
3 Chemical Chemical A disk operating in a humid atmosphere may experience some deterioration in the electrical connectors between the circuit board on the disk Electrical Surge/ Component Damage to voice coil, spindle motor can occur as a result of power surges. Firmware/ Service area failure Failure Corruption of the firmware area may result due to incorrect storage but can also result due to the age of the device. It may also occur during disk use as firmware commands/modules corrupt the device Table 1: Disk Failure It should also be noted that some of the faults discussed above may arise as a result of malicious user activity or could also be the result of wear and tear on the disks. FAULTY DRIVES PURCHASED IN THE 2008 DISK STUDY The disks that were purchased as part of the disk study and that arrived in a faulty state could be as a result of three possibilities, each of which has a potential impact as to whether data had been removed from the drive: 1) The disk was sold in a working state and damaged in transit as a result of some form of kinetic shock. In this case the disks may or may not have had data removed. 2) The disk was knowingly sold in a faulty state after suffering some form of mechanical or electrical failure. In this case it is likely the user would not have had the opportunity to remove data from the disk. 3) The disk failed during its last use by the previous owner and was sold unknowingly in a faulty state. In this case the disks may or may not have had data removed. Although the third option is a possibility, based on the number of drives faulty in the disk studies and the number of reliable power on / power off cycles, it is considered more likely that either the disks were damaged in transit or failed prior to being offered for sale. Most hard disks in a powered down and parked state are able to withstand a degree of mechanical shock. Although it should be noted that a number of disks that were obtained for the study were inadequately packaged when shipped from their previous owner. We therefore suggest that that it is reasonable to conclude that the majority of disks are most likely to fall into the second category those disks that have been knowingly sold in a faulty or failed state. If this is the case then the owners are unlikely to have had the opportunity to remove their data from the disk. A seller may be of the opinion that if they are unable to access the contents of a drive then neither can anyone else. HYPOTHESIS Based on these assumptions we suggest that comparing the sample of faulty drives in the disk study to those of the working disks; overall the faulty drives are more likely to contain user data and that provided the drives can be returned to a working state this data can probably be accessed. HARD DISK FAILURE A disk was considered faulty if the drive failed to spin up normally and present itself as a working disk to FTK imager, therefore resulting in it being not possible to access the disks using normal forensic tools. The disks when powered up for analysis and connected to a write-blocker displayed a variety of symptoms varying from spinning up (based on slight vibrations and an audible check), in some a rhythmic clicking of the disk heads, others produced no activity suggesting some form of electrical failure. In one example, a disk from the 2008 disk study (07GB053) was reported as making an electronic pinging noise, similar to early space invaders games when powered on. A visual inspection of the exterior of the disk revealed a slight dent in the upper cover in the area where the disk head traversed the platters of the disk. The disk was opened and it was determined that the read/write head was located in the centre of the platter rather than in the parked position. As a result the depression in the outer case had resulted in one of the read/write heads becoming wedged on the disk surface. When power was supplied to the disk and it attempted to carry out the 158 P age
4 initial read / seek this resulted in the voice coil 46 causing the pinging sound. The disk platters were manually rotated and the head moved back to the parked position. The disk was then powered on and after a single ping the normal start up seek sequence was performed with the heads travelling across the surface of he platter as normal. However, subsequent attempts to recover data from the disk failed as it did not present itself as ready to accept/process ATA commands. The conclusion was that either the delicate read/write head mechanism had been damaged in some way as a result of it being forced down onto the surface of the platter, or that the disk spindle /platters had been distorted, although there was no visible damage to either the platters or disk heads. A laser pointer was used to check for distortion on the platters. The resulting elliptical path of the reflected laser beam suggested that the spindle hand been bent out of place and that this disk could only be recovered by relocating the disk platters into a new chassis, assuming the platter themselves had not been damaged. In this study, due to the difficulty in obtaining matching donor parts and to provide an idea of the capability of a user with access to only the equipment, repairs type 1 and 2 (Table 2) were applied so no further work was carried out on this disk. It was determined that the faulty disks examined in the study could be divided into four classes in terms of the possible disk repair and data recovery, based on the skills and technology required. Type Repair 1 A simple mechanical fix, requiring no specialist tools or donor parts. Typically this would be resetting the disk head / parking the disk head / PCB repair. 2 Recovery using specialist tools either to image a failing disk drive or to repair disk firmware. 3 A complex mechanical fix requiring the use of donor parts to replace or rebuild faulty mechanical components of the disk. 4 No repairs possible FAILED DISK ANALYSIS Table 2: Disk Repair The disks that did not image in the 2008 study were separated into SCSI and IDE drives, with the recovery tools available, this study focussed on the IDE drives which provide a sample size of 32 hard disks. The 32 faulty IDE disks were examined and none of the drives were determined to be type 1 drives, rather 10 drives (31% of the IDE disks) were identified as being type 2 and 20 (63%) drives were identified as being type 3 drives, requiring donor parts to return them to an operational state. Only 2 (6%) disk drives were judged to be irreparable, the pinging disk (07GB053) discussed above and one other disk drive which had undergone a head-crash which had caused significant damage to the disk platters. The 10 type 2 drives were further analysed to determine the degree of data, if possible, that could be extracted from the disk drives. A more detailed analysis indicated that 3 (9%) of the disks were either partially supported by the recovery equipment and so could not be analysed further. The 7 disks (22%) that disks that could be repaired displayed two main problems: Either the need for a specialised interface and jumper requirements (4 disks) or varying degrees of firmware corruption (3 disks). Restored Disk Results Once the drives had been restored to enable access to the drive contents it was possible to determine that 2 of the 7 (29% of the restored disks) were wiped and that the remaining 5 (71% of the restored disks) contained varying degrees of data. This is in comparison to the 2008 disk study results where 31% of the readable disks were wiped and 69% contained data. The data recovered from the restored drives included music, password files, surfing histories and for one company; financial contracts, work proposals, client details, and attachments. Overall the results are broadly similar to the analysis of working disks in the 2008 study, but the sample size of 7 restored disks is very 46 In a modern hard disk, the actuator uses a device called a voice coil to move the read/write head arms back and forward across the surface of the platters. The voice coil is operated by using electromagnetic attraction and repulsion. 159 P age
5 small. Therefore future work will focus on the restoration of drives classed as type 3 (requiring spare parts) to determine if this makes a significant difference to the number of drives containing data. CONCLUSION The implications of this work suggest that disks that are found to be faulty and which fail to spin up or cannot be recognised by the operating system may not be truly dead. A significant number of these disks can be restored and users with access to the appropriate tools and technology can then recover the data with relative ease. Many forensic investigators already utilise data recovery tools to recover potential evidence, however there may be other users with less honourable intentions. Although the majority of the specialist tools described in this paper can be acquired for between a few hundred and a few thousand pounds, in terms of the threat vectors it is more likely to be commercial competitors from a large organisation, or nation states engaged in commercial espionage and is less likely to be from private individuals due to the cost and time involved in some of the recovery techniques. REFERENCES American Forces Press Service (2006), Current Service members Possibly Affected by VA Data Loss, 6 June BBC News (2005), Data dangers dog hard drive sales, BBC, 12 September Canadian Globe and Mail (1993), Disk Slipped Into Wrong Hands, Canadian Globe and Mail, 2 nd August Cullen D. (2000), Paul McCartney account details leaked on second user PC, The Register, 9th February Fragkos G. et al (2006) An empirical methodology derived from the analysis of information remaining on second hand hard disks in Blyth A and Sutherland I., WFDIA Proceedings of the first workshop in Digital Forensics and Incident Analysis Garfinkel S.L, Shelat A, (2003), Remembrance of Data Passed: A Study of Disk Sanitization Practices. IEEE Security & Privacy, Vol. 1, No. 1, Gutmann, P. (1996), Secure Deletion of Data from Magnetic and Solid-State Memory, Sixth USENIX Security Symposium Proceedings, San Jose, California, July 22-25, Gutmann, P. (2001), Data Remanence in Semiconductor Devices, 10th USENIX Security Symposium, Washington, D.C., August 13-17, Jenkins, C. (2005), Govt data sent to auction. The Australian, 2 nd August Johannes, R. (2006), The Demographics of Identity Fraud: Through education and vigilance, banks can prepare and protect those most vulnerable, Javelin Research, Aug Jones, A., Mee, V., Meyler, C., and Gooch, J,(2005), Analysis of Data Recovered From Computer Disks released for sale by organisations, Journal of Information Warfare, (2005) 4 (2), Jones A., Valli C., Sutherland I., Thomas P. (2006) An Analysis of Information Remaining on Disks offered for sale on the second hand market. Journal of Digital Security, Forensics & Law. Volume 1, Issue 3. Jones A, Dardick G., Sutherland I, Valli C., (2007) The 2007 Analysis of Information Remaining on Disks offered for sale on the second hand market. Journal of Digital Security, Forensics & Law. IN PRESS Kerber R (2006), Firm will settle with state over data loss: Missing laptop had information on thousands, Boston Globe, 12 December Leyden, J. (2004), Oops! Firm accidentally ebays customer database, The Register, 7 June P age
6 Price Waterhouse Cooper (2006), DTI Information security breaches survey 2006, Sept Pinheiro E., Weber W., Barroso L.A., (2007) Failure Trends in a Large Disk Drive Population, USENIX Association Storage Technologies, FAST 07: 5th USENIX Conference on File and USENIX Association Storage Technologies Schroeder B., Gibson G. (2007) Disk failures in the real world: What does an MTTF of 1,000,000 hours mean to you?, USENIX Association Storage Technologies, FAST 07: 5th USENIX Conference on File and USENIX Association Storage Technologies Sutherland I, and Mee V. (2006) Data Disposal: How educated are your Schools?, 6th European Conference on Information Warfare and Security, June Synovate, (2003), Federal Trade Commission Identity Theft Survey Report, Federal Trade Commission, June TechWeb, (2005), Seven-In-Ten Second-hand Hard Drives Still Have Data, TechWeb News, 31 May Valli, C. (2004), Throwing out the Enterprise with the Hard Disk, In 2nd Australian Computer, Information and Network Forensics Conference, We-BCentre.COM, Fremantle Western Australia. Valli C. & Woodward A., (2007) Oops they did it again: The 2007 Australian study of remnant data contained on 2 nd hand hard disk Presented at the 5 th Australian Digital Forensics Conference, Edith Cowan University Australia. Vance A (2006a), Ernst & Young fails to disclose high-profile data loss: Sun CEO's social security number exposed, The Register, 25 February Vance A (2006b), Wells Fargo fesses up to data loss: Lightning strikes twice for HP man, The Register, 12 May Vidström A, (2005) Computer forensics and the ATA interface, White Paper, Swedish Defence Research Agency ACKNOWLEDGEMENTS The authors would like to acknowledge the generous sponsorship of British Telecommunications (BT) who support the disk study each year. In addition to the authors of this paper, we would like to acknowledge the other researchers who participated in all of the disk study work in current and previous disk studies and our colleagues and friends at Edith Cowan, Longwood and Glamorgan Universities. 161 P age
The Impact of Hard Disk Firmware Steganography on Computer Forensics
The Impact of Hard Disk Firmware Steganography on Computer Forensics Iain Sutherland Faculty of Advanced Technology University of Glamorgan CF37 1DL +44(0)1443 654085 isutherl @glam.ac.uk Gareth Davies
Who is Reading the Data on Your Old Computer?
Who is Reading the Data on Your Old Computer? Vivienne Mee Rits Information Security Citywest Business Campus Co. Dublin [email protected] ABSTRACT Researchers at Rits Information Security performed
The Importance of Data Retention
Section 2 Information Systems Security & Web Technologies and Security Abstract Information Security Leakage: A Forensic Analysis of USB Storage Disks A.Adam and N.L.Clarke Centre for Information Security
data recovery specialists
data recovery specialists Last year we helped thousands of clients to recover data from media including hard disk drives, RAID, USB drives, tapes and even mobile phones. This is why clients such as MITIE,
Hard Disk Storage: Firmware Manipulation and Forensic Impact and Current Best Practice
Hard Disk Storage: Firmware Manipulation and Forensic Impact and Current Best Practice Gareth Davies, Iain Sutherland Faculty of Advanced Technology University of Glamorgan CF37 1DL +44(0)1443 480480 {gddavies,
Forensic Imaging of Hard Disk Drives
This white paper explores the area of a hard disk drive not usually examined for data, what it is and how to access it Forensic Imaging of Hard Disk Drives -What we thought we knew By Todd G. Shipley and
Performance. Storage capacity. Software support. Reliability
HARD DISK DRIVES Performance Storage capacity Software support Reliability Why we call it as. Hard disk Fixed disk Winchester disk Hard Disk Drive Components Disk platter Read/Write head Head arm/head
Taurus Super-S3 LCM. Dual-Bay RAID Storage Enclosure for two 3.5-inch Serial ATA Hard Drives. User Manual March 31, 2014 v1.2 www.akitio.
Dual-Bay RAID Storage Enclosure for two 3.5-inch Serial ATA Hard Drives User Manual March 31, 2014 v1.2 www.akitio.com EN Table of Contents Table of Contents 1 Introduction... 1 1.1 Technical Specifications...
Difference between Enterprise SATA HDDs and Desktop HDDs. Difference between Enterprise Class HDD & Desktop HDD
In order to fulfil the operational needs, different web hosting providers offer different models of hard drives. While some web hosts provide Enterprise HDDs, which although comparatively expensive, offer
Recover data from a defective Fujitsu desktop drive
Data Compass - Case Study Recover data from a defective Fujitsu desktop drive Symptom: Data on the Fujitsu desktop drive is not accessible directly by the client. The initial diagnosis implies that the
Enterprise-class versus Desktopclass
Enterprise-class versus Desktopclass Hard Drives April, 2008 Enterprise Platforms and Services Division - Marketing Revision History Date Revision Number April, 2008 1.0 Initial Release Modifications Disclaimers
How To Read Memory Chips From A Cell Phone Or Memory Chip
Recovering data from mobile phones An easy, cost-effective service based on the NFI Memory Toolkit by the Netherlands Forensic Institute Mobile phones a rich source of valuable information Mobile phones
Price/performance Modern Memory Hierarchy
Lecture 21: Storage Administration Take QUIZ 15 over P&H 6.1-4, 6.8-9 before 11:59pm today Project: Cache Simulator, Due April 29, 2010 NEW OFFICE HOUR TIME: Tuesday 1-2, McKinley Last Time Exam discussion
Challenges and Solutions for Effective SSD Data Erasure
Challenges and Solutions for Effective SSD Data Erasure Blancco White Paper Published 8 October 2013 First Edition Table of contents Introduction...3 The Simplicity And Complexity Of SSDs...4 Traditional
Enterprise-class versus Desktop-class Hard Drives
Enterprise-class versus Desktop-class Hard Drives A document providing a comparison between enterprise-class and desktop-class hard drives Rev 2.0 April 2016 Intel Server Boards and Systems
Lesson Plan. Preparation
Lesson Plan Course Title: Computer Maintenance Session Title: Hard Drives Lesson Duration: 90 Minutes Performance Objective: Upon completion of this assignment, the student will be able to recognize a
RAID Technology Overview
RAID Technology Overview HP Smart Array RAID Controllers HP Part Number: J6369-90050 Published: September 2007 Edition: 1 Copyright 2007 Hewlett-Packard Development Company L.P. Legal Notices Copyright
Technical Proposal on ATA Secure Erase Gordon Hughes+ and Tom Coughlin* +CMRR, University of California San Diego *Coughlin Associates
Technical Proposal on ATA Secure Erase Gordon Hughes+ and Tom Coughlin* +CMRR, University of California San Diego *Coughlin Associates Introduction and Summary Secure erase SE is defined in the ATA specification
True Data Disaster Recovery. PRESENTATION TITLE GOES HERE Matthew Kinderwater icube Development (Calgary) Ltd.
PRESENTATION TITLE GOES HERE Matthew Kinderwater icube Development (Calgary) Ltd. Who We Are: Provide data recovery / data redundancy / disaster plan consulting services worldwide. Operate one of the largest
Disk Geometry: How Data is Organized on a Hard Disk Drive
Disk Geometry: How Data is Organized on a Hard Disk Drive The surface of the drive platter is organized with coordinates, much like a map. Data is stored in concentric tracks on the surfaces of each platter.
MAXIMUM PROTECTION, MINIMUM DOWNTIME
MANAGED SERVICES MAXIMUM PROTECTION, MINIMUM DOWNTIME Get peace of mind with proactive IT support Designed to protect your business, save you money and give you peace of mind, Talon Managed Services is
1 of 10 2009-08-25 02:01
1 of 10 2009-08-25 02:01 Forum search Hot News! Home Products Contacts Support Order now Register Our certificates Our previous site 2 of 10 2009-08-25 02:01 PC-3000 for Windows What is PC-3000 for Windows?
Solid State Drives (SSDs)
Solid State Drives (SSDs) Overview, Benefits, and Applications Document History Revision Release Date Author Purpose and/or Desc. of Changes 1.0 10/12/07 Yelena Pesic First Revision 1.1 2/26/08 Yelena
Today we will learn about:
Storage Devices Today we will learn about: Storage Devices Ancient technology (from my days as a student) Floppies CD_ROM, DVDs Hard drives Magnetic tape Storage versus Memory Memory holds data, programs
EaseUS Partition Master
Reviewer s Guide Contents Introduction... 2 Chapter 1... 3 What is EaseUS Partition Master?... 3 Versions Comparison... 4 Chapter 2... 5 Using EaseUS Partition Master... 5 Partition Manager... 5 Disk &
Trabajo 4.5 - Memorias flash
Memorias flash II-PEI 09/10 Trabajo 4.5 - Memorias flash Wojciech Ochalek This document explains the concept of flash memory and describes it s the most popular use. Moreover describes also Microdrive
Secure Erase of Disk Drive Data
Secure Erase of Disk Drive Data Gordon Hughes and Tom Coughlin Introduction A cardinal rule of computer data storage devices is to protect user data at all costs. This includes protection against accidental
Cyber and Data Security. Proposal form
Cyber and Data Security Proposal form This proposal form must be completed and signed by a principal, director or a partner of the proposed insured. Cover and Quotation requirements Please indicate which
File System & Device Drive. Overview of Mass Storage Structure. Moving head Disk Mechanism. HDD Pictures 11/13/2014. CS341: Operating System
CS341: Operating System Lect 36: 1 st Nov 2014 Dr. A. Sahu Dept of Comp. Sc. & Engg. Indian Institute of Technology Guwahati File System & Device Drive Mass Storage Disk Structure Disk Arm Scheduling RAID
Taurus - RAID. Dual-Bay Storage Enclosure for 3.5 Serial ATA Hard Drives. User Manual
Dual-Bay Storage Enclosure for 3.5 Serial ATA Hard Drives User Manual v1.0 August 23, 2007 EN Table of Contents CHAPTER 1 - INTRODUCTION 1 CHAPTER 3 - SYSTEM SET UP 9 ICON KEY 1 THE TAURUS RAID 1 AVAILABLE
File System Management
Lecture 7: Storage Management File System Management Contents Non volatile memory Tape, HDD, SSD Files & File System Interface Directories & their Organization File System Implementation Disk Space Allocation
Whitepaper. Mag EraSURE : the Cost-effective Solution for Securely Erasing Magnetically Recorded Data. Degausser
Mag EraSURE : the Cost-effective Solution for Securely Erasing Magnetically Recorded Data Until recently, most people did not question what became of a hard disk drive (HDD) when a computer was scrapped.
is605 Dual-Bay Storage Enclosure for 3.5 Serial ATA Hard Drives FW400 + FW800 + USB2.0 Combo External RAID 0, 1 Subsystem User Manual
is605 Dual-Bay Storage Enclosure for 3.5 Serial ATA Hard Drives FW400 + FW800 + USB2.0 Combo External RAID 0, 1 Subsystem User Manual (English/Deutsch/ 中 文 ) v1.0 August 23, 2007 Table of Contents CHAPTER
Incident Response and Computer Forensics
Incident Response and Computer Forensics James L. Antonakos WhiteHat Forensics Incident Response Topics Why does an organization need a CSIRT? Who s on the team? Initial Steps Detailed Project Plan Incident
Media Damage and Hard Drive Data Recovery. The term media refers to the platters. Data resides on the platter surfaces.
Media Damage and Hard Drive Data Recovery Many clients are stunned to learn that their hard drives have suffered a head crash, resulting in significant internal damage. But I only dropped it a few (inches
Connect Smart for Business SME TOOLKIT
Protect yourself online Connect Smart for Business SME TOOLKIT WELCOME To the Connect Smart for Business: SME Toolkit The innovation of small and medium sized enterprises (SMEs) is a major factor in New
Safety guidance. Buying electrical goods online? The safe shopper s guide. electricalsafetyfirst.org.uk
Safety guidance Buying electrical goods online? The safe shopper s guide electricalsafetyfirst.org.uk Every year around 70 deaths and 350,000 injuries in UK homes are caused by faulty electrics and electrical
technology brief RAID Levels March 1997 Introduction Characteristics of RAID Levels
technology brief RAID Levels March 1997 Introduction RAID is an acronym for Redundant Array of Independent Disks (originally Redundant Array of Inexpensive Disks) coined in a 1987 University of California
Gadget Insurance. Terms and Conditions. @ w. phone: email: web
phone: email: web @ w Customer Services 1890 818 040 [email protected] www.protectyourbubble.com Gadget Insurance Terms and Conditions Gadget Insurance Terms and Conditions This
Guidelines for Disposal of Goods & Equipment
Guidelines for Disposal of Goods & Equipment Public Procurement Board Accra, Ghana Preface Procurement and disposal of goods and equipment by Procurement Entities under projects financed from the Public
Data recovery from a drive with physical defects within the firmware Service Area, unrecoverable using
SalvationDATA Data Recovery Example Application: Image from the HDD with serious bad sectors in the Data Area by Data Compass What failures can Data Compass help to solve? 1.Logical Malfunctions Partition
Scientific Working Group on Digital Evidence
Scientific Working Group on Disclaimer: As a condition to the use of this document and the information contained therein, the SWGDE requests notification by e-mail before or contemporaneous to the introduction
HP Notebook Hard Drives & Solid State Drives. Identifying, Preventing, Diagnosing and Recovering from Drive Failures. Care and Maintenance Measures
HP Notebook Hard Drives & Solid State Drives Identifying, Preventing, Diagnosing and Recovering from Drive Failures Care and Maintenance Measures Technical White Paper Table of contents Identifying, Preventing,
Digital Image Formation. Storage Technology
Digital Image Formation Storage Technology Storage Technology Quiz Name one type of data storage?! Storage Technology Data Storage Device is a device for recording (storing) information (data).!! Recording
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Here are my slides from lecture, along with my notes about each slide.
Chapter 3: Storage Here are my slides from lecture, along with my notes about each slide. NOTE: You are expected to attend all class meetings. Please be in the room when class begins and be ready to participate
William Stallings Computer Organization and Architecture 8 th Edition. External Memory
William Stallings Computer Organization and Architecture 8 th Edition Chapter 6 External Memory Types of External Memory Magnetic Disk RAID Removable Optical CD-ROM CD-Recordable (CD-R) CD-R/W DVD Magnetic
Case Study: Quick data recovery using HOT SWAP trick in Data Compass
Case Study: Quick data recovery using HOT SWAP trick in Data Compass What failures can Data Compass help to solve? 1.Logical Malfunctions Partition Loss File loss or destruction Virus attack Accidental
Hydra Super-S Combo. 4-Bay RAID Storage Enclosure (3.5 SATA HDD) User Manual July 29, 2009 - v1.3
4-Bay RAID Storage Enclosure (3.5 SATA HDD) User Manual July 29, 2009 - v1.3 EN Introduction 1 Introduction 1.1 System Requirements 1.1.1 PC Requirements Minimum Intel Pentium III CPU 500MHz, 128MB RAM
Impact of Digital Forensics Training on Computer Incident Response Techniques
Impact of Digital Forensics Training on Computer Incident Response Techniques Valorie J. King, PhD Collegiate Associate Professor University of Maryland University College Presentation to AFCEA June 25,
This user guide describes features that are common to most models. Some features may not be available on your computer.
RAID User Guide Copyright 2011 Hewlett-Packard Development Company, L.P. Intel is a trademark of Intel Corporation in the U.S. and other countries. Microsoft and Windows are U.S. registered trademarks
The Advanced Way Of Data Recovery
The Advanced Way Of Data Recovery Bhagyashri P. Deshpande M.E (P.T) Computer Science Department Prof.Ram Meghe Institute of Engg.& Technology,Badnera [email protected] ABSTRACT: Data recovery refers
Mobile HDDs. 1. Introduction. 2. Market trends in 2.5-inch ATA HDDs. (Manuscript received July 19, 2005) V Shigenori Yanagi
Mobile HDDs V Shigenori Yanagi (Manuscript received July 19, 2005) Fujitsu has developed 0 GB and 160 GB capacity HDDs for notebook PCs and other mobile applications. The high capacities of these drives
Data recovery Data management Electronic Evidence
Data recovery Data management Electronic Evidence 2 RAID, SAN and Virtual systems RAID, SAN and Virtual systems Data Loss Scenarios: RAID Recovery drive failure Deleted VM recovery Reinstall of ESX on
DO IT YOURSELF DATA RECOVERY
DO IT YOURSELF DATA RECOVERY Hakin9 EXTRA FRANK MEINCKE Electronic data and information has become a crucial portion of one s life. Data is important whether it is your Business Operations Data, Secret
EXIN Information Security Foundation based on ISO/IEC 27002. Sample Exam
EXIN Information Security Foundation based on ISO/IEC 27002 Sample Exam Edition June 2016 Copyright 2016 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored
The Windows Vista Recovery Environment
The Windows Vista Recovery Environment By Mark Edward Soper Introduction The Windows Vista Recovery Environment (Figure 1) provides five ways to recover from serious computer problems that may prevent
User Manual. iosafe Solo G3. Fanless Airflow Design Data Recovery Service (DRS) No-Hassle TM Warranty
User Manual iosafe Solo G3 Fanless Airflow Design Data Recovery Service (DRS) No-Hassle TM Warranty Built to protect and backup data: Backup for Primary Hard Drive Protect against primary drive failure
POLICY NAME IT DISASTER RECOVERY POLICY AND PLAN POLICY NUMBER POLICY FILE REFERENCE 3/3/6 DATE OF ADOPTION REVIEW OR AMENDMENT DATES
POLICY NAME IT DISASTER RECOVERY POLICY AND PLAN POLICY NUMBER P6 POLICY FILE REFERENCE 3/3/6 DATE OF ADOPTION REVIEW OR AMENDMENT DATES C O N T E N T S INTRODUCTION SECTION 1 DISASTER PREVENTION AND RECOVERY
Hard Drive Diagnostics With Scott Moulton. Hard Drive Data Recovery Forensics SANS 2010 1
Hard Drive Diagnostics With Scott Moulton Hard Drive Data Recovery Forensics SANS 2010 1 Goals of this Speech! 1. Give you useful knowledge you can take away and use right now. 2. Make sure you know what
PROTECTING YOUR DIGITAL LIFE
PROTECTING YOUR DIGITAL LIFE Table of Contents What is a Digital Life?... 1 Missing: Five Years of Photos... 2 Are Your Files Safe?... 3 Everyday Risks... 4 Real People, Real Loss... 5 Forgot to Back Up?
Sure Managed Networks Essential Level Support Service Terms & Conditions
Essential Level Support Service Description Sure s Support Service combines traditional maintenance and technical support services to support your Customer Premises Equipment. It enables enhanced service
DATA SECURITY DATA RECOVERY DATA ERASING COMPUTER FORENSICS
DATA SECURITY DATA RECOVERY DATA ERASING COMPUTER FORENSICS Data Recovery Center EPOS Data Recovery Center offers a unique set of solutions and services in the field of data recovery and information EPOS
EVALUATION OF REGISTRY DATA REMOVAL BY SHREDDER PROGRAMS
Chapter 5 EVALUATION OF REGISTRY DATA REMOVAL BY SHREDDER PROGRAMS Harry Velupillai and Pontjho Mokhonoana Abstract Shredder programs attempt to overcome Window s inherent inability to erase data completely.
University of Liverpool
University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October
Avid Unity MediaNetwork 5 System Maintenance
Avid Unity MediaNetwork 5 System Maintenance Avid Technology EMEA Enterprise Customer Success Page 1 of 21 Table of Contents Introduction... 2 Daily Maintenance Procedures... 3 Check the Monitor Tool for
INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies
INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies REMOVABLE MEDIA: NSW MoH are currently undergoing review with a state-wide working party developing the Draft NSW
We reserve the right to make technical changes.
User Guide External Hard Disk with USB 1.1/2.0 and IEEE 1394 connection Copyright 2003 All rights reserved. This manual is protected by Copyright. The Copyright is owned by Medion. Trademarks: MS-DOS and
VERY IMPORTANT NOTE! - RAID
Disk drives are an integral part of any computing system. Disk drives are usually where the operating system and all of an enterprise or individual s data are stored. They are also one of the weakest links
Solid State Drive ssd.supertalent.com
SSD User Manual Solid State Drive ssd.supertalent.com Table of Contents 1. Product Overview... 2 (1.1) PRODUCT DEFINITION... 2 (1.2) INTERFACE DESCRIPTION... 2 1.2.1 SATA Interface... 2 1.2.2 IDE Interface...
Lecture 16: Storage Devices
CS 422/522 Design & Implementation of Operating Systems Lecture 16: Storage Devices Zhong Shao Dept. of Computer Science Yale University Acknowledgement: some slides are taken from previous versions of
ISO IEC 27002 2005 (17799 2005) INFORMATION SECURITY AUDIT TOOL
9.1 USE SECURITY AREAS TO PROTECT FACILITIES 1 GOAL Do you use physical methods to prevent unauthorized access to your organization s information and premises? 2 GOAL Do you use physical methods to prevent
Recover My Files v5. Chapter Contents. Published: 18 March 2013 at 12:52:56. Frequently Asked questions... 5. Data Recovery Fundamentals...
Recover My Files v5 Chapter Contents Published: 18 March 2013 at 12:52:56 Frequently Asked questions... 5 Data Recovery Fundamentals... 9 Hardware Recovery... 10 Software Recovery... 11 Chapter 1 Introducing
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
Retrieving Internet chat history with the same ease as a squirrel cracks nuts
Retrieving Internet chat history with the same ease as a squirrel Yuri Gubanov CEO, Belkasoft http://belkasoft.com SANS Forensic Summit September 21, 2011 London, Great Britain What is Instant Messenger!
Portable Bluetooth Speaker. Quick Start Guide. Model: BTS201
Portable Bluetooth Speaker Quick Start Guide Model: BTS201 Disclaimer All the information, design and specifications contained in this manual were correct at the time of publication. However, as the product
RAID HARDWARE. On board SATA RAID controller. RAID drive caddy (hot swappable) SATA RAID controller card. Anne Watson 1
RAID HARDWARE On board SATA RAID controller SATA RAID controller card RAID drive caddy (hot swappable) Anne Watson 1 RAID The word redundant means an unnecessary repetition. The word array means a lineup.
Security A to Z the most important terms
Security A to Z the most important terms Part 1: A to D UNDERSTAND THE OFFICIAL TERMINOLOGY. This is F-Secure Labs. Learn more about the most important security terms with our official explanations from
LAW OFFICE SECURITY for Small Firms and Sole Practitioners. Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan
LAW OFFICE SECURITY for Small Firms and Sole Practitioners Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan 1. Introduction CONTENTS 2. Security Consciousness Having a Firm Security
NIST CFTT: Testing Disk Imaging Tools
NIST CFTT: Testing Disk Imaging Tools James R. Lyle, Ph.D. Computer Scientist National Institute of Standards and Technology 1. Introduction There is a critical need in the law enforcement community to
Verizon NEBS TM Compliance: Data Center Equipment NEBS Requirements Verizon Technical Purchasing Requirements VZ.TPR.9703 Issue 2, March 2012
Verizon NEBS TM Compliance: Data Center Equipment NEBS Requirements Verizon Technical Purchasing Requirements VZ.TPR.9703 Issue 2, March 2012 CHANGE CONTROL RECORD: Version Date Action* Reason for Revision
Maybe you actually know these facts, but without a professional tool, it just does not make any sense.
Still trying your luck in swapping a hard drive HEAD STACK and fail most of the time? That's probably because the HEAD and the platter touch each other during the swap. All data gone or corrupted after
2.5-inch Hard Disk Drive with High Recording Density and High Shock Resistance
2.5-inch Hard Disk Drive with High Recording Density and High Shock Resistance By KUSUMOTO Tatsuharu, TODA Akio Toshiba has developed the MQ01ABD100 dual-platter 2.5-inch hard disk drive (HDD) with a capacity
Statement of Work. Business Support Service
Statement of Work Business Support Service Business Support Service Overview Dell s Client Business Support Service combines rapid response and resolution with advanced technical assistance and account
Asset Management Procedure
1 Purpose Effective asset management and capital expenditure are essential to the continuity, development and growth of Victoria University of Wellington ( the University ). They are closely linked to
GENERAL INFORMATION COPYRIGHT... 3 NOTICES... 3 XD5 PRECAUTIONS... 3 INTRODUCTION... 4 FEATURES... 4 SYSTEM REQUIREMENT... 4
1 Table of Contents GENERAL INFORMATION COPYRIGHT... 3 NOTICES... 3 XD5 PRECAUTIONS... 3 INTRODUCTION... 4 FEATURES... 4 SYSTEM REQUIREMENT... 4 XD5 FAMILULARIZATION... 5 PACKAGE CONTENTS... 5 HARDWARE
