ch-4
ch-4
Data Recovery
• Data recovery is the process of recovering and handling the data through the
data from damaged, failed, corrupted, or inaccessible secondary storage
media when it cannot be accessed normally.
• Often times, these files are being stored in hard drives and removable disks,
including CDs, DVDs, tape cartridges, flash memories
• Different data recovery tools are
1. Puran File Recovery
2. Glary Undelete
3. Pandora Recovery
4. Recuva
5. FreeUndelete
6. Restoration
7. Wise Data Recovery
8. EaseUS Data Recovery Wizard
9. SoftPerfect File Recovery
10. Diskinternal_s
NTFS
NTFS stands for New Technology File System and this took over from FAT as
the primary file system being used in Windows.
NTFS is the file system that the Windows NT operating system uses for
storing and retrieving files on a hard disk.
NTFS is the Windows NT equivalent of the Windows FAT and the High
Performance File System (HPFS).
NTFS offers a number of improvements over FAT and HPFS in terms of
performance, extendibility, and security.
Partitions
A partition is a logical division of a hard disk that is treated as a separate
unit by operating systems (OSes) and file systems.
The OSes and file systems can manage information on each partition as if
it were a distinct hard drive.
This allows the drive to operate as several smaller sections to improve
efficiency, although it reduces usable space on the hard disk because of
additional overhead from multiple OSes.
Types of Hard drive partitions
1. Primary Partition is a partition that is needed to store and boot an
operating system, though applications and user data can reside there as
well, and what’s more, you can have a primary partition without any
operating system on it.
2. Active (boot) partition is a primary partition that has an operating
system installed on it. It is used for booting your machine. If you have
a single primary partition, it is regarded as active. If you have more
than one primary partition, only one of them is marked active.
3. Extended partition can be sub-divided into logical drives and is
viewed as a container for logical drives, where data proper is located.
An extended partition is not formatted or assigned a drive letter. The
extended partition is used only for creating a desired number of logical
partitions.
(note :- while writing example you can write procedure of any suitable tool)
1. NTFS Data Recovery Tools: NTFS Recovery is a fully automatic utility that
recovers data from damaged or formatted disks. It is designed with a home user in
mind. You don't need to have any special knowledge in disk recovery.
Example: - Diskinternal_s NTFS Data Recovery tool. The tool supports
malfunction.
les or folders are not readable
FAT Recovery is fully wizard-based, meaning there is no technical knowledge
needed. Any person can recover data from damaged or formatted disks on their
own, without hiring a technician. FAT Recovery does not write anything to the
damaged disk, therefore you can try the program without any risk of losing data
you want to be recovered. It does not matter whether Windows recognizes a disk or
not, nor does it matter if all directory information is missing – all recoverable data
will be recovered and the original disk structure will be restored. Because the
program scans every single sector, it never misses recoverable data. Another
important advantage of FAT Recovery is its capability to recover data from virtual
disks, and it does not matter if the data was deleted prior to recovery or not. FAT
Recovery supports the following file systems - FAT12, FAT16, FAT32, and
VFAT. Files up to 64 KB are recovered by FAT Recovery.
Ethics
• Computer ethics deals with the procedures, values and practices that govern
the process of consuming computing technology and its related disciplines
without damaging or violating the moral values and beliefs of any
individual, organization or entity.
• Computer ethics is a concept in ethics that addresses the ethical issues and
constraints that arise from the use of computers, and how they can be
mitigated or prevented
Cyber Crime
4.Pornography
Child Pornography is a very inhuman and serious cybercrime offence.
It includes the following:
Any photograph that can be considered obscene and/or unsuitable for the
age of child viewer. Film, video, picture.
Computer generated image or picture of sexually explicit conduct where
the production of such visual depiction involves the use of a minor
engaging in sexually explicit conduct .
Internet is the most frequently used tool for such criminals to reach
children and practice child sex abuse.
The spreading use internet and its easy accessibility to children has made
them viable victim to cybercrime.
There is a type of humans called Pedophiles who usually allure the
children by obscene Pornographic contents and then they approach them
for sex.
Then they take their naked photographs while having sex. Such people
sometime misguide children telling them that they are of the same age
and win their confidence.
Then they exploit the children either by forcing them to have sex or
selling their pictures over internet.
5. Software Piracy
Cybercrime Investigation Cell of India defines ―software piracy‖ as
theft of software through the illegal copying of genuine programs or
the counterfeiting and distribution of products intended to pass for the
original.
Software piracy can be defined as ―copying and using commercial
software purchased by someone else‖ .
Software piracy is illegal.
Each pirated piece of software takes away from company profits,
reducing funds for further software development initiatives.
Making duplication of software is an act of copyright infringement,
and it‗s illegal.
Providing unauthorized access to software or to serial numbers used to
register software can also be illegal ways to Deal With/Minimize
Software Piracy : ―
Have a central location for software programs.Know which
applications are being added, modified or deleted.
Secure master copies of software and associate
documentation, while providing faculty access to those
programs when needed.
Never lend or give commercial software to unlicensed users.
Permit only authorized users to install software.
Train and make staff aware of software use and security
procedures which reduce likelihood of software piracy.
6. Intellectual Property
Intellectual property (IP) rights are the legally recognized exclusive rights to
creations of the mind.
Under intellectual property law, owners are granted certain exclusive rights
to a variety of intangible assets, such as musical, literary, and artistic works;
discoveries and inventions; and words, phrases, symbols, and designs.
Intellectual Property Rights (IPR), are rights granted to creators and owner
of works that are results of human intellectual creativity.
These works can be in the industrial, scientific, literary and artistic domains,
which can be in form of an invention, a manuscript, a suite of software or a
business name.
The agreement provides norms and standards for protection and enforcement
of IPRS in member countries, in respect to following areas patents,
copyrights, trademarks, industrial designs, layout designs of integrated
circuits etc.
IPR is an important consideration in issues concerning licensed software.
8. Mail Bomb
Email ―bombing" is characterized by abusers repeatedly sending an
identical email message to a particular address.
A mail bomb is the sending of a massive amount of email to a
specific person or system.
A huge amount of mail may simply fill up the recipient‗s disk space
on the server or, in some cases, may be too much for a server to
handle and may cause the server to stop functioning.
Mail bombs not only inconvenience the intended target but they are
also likely to inconvenience everybody using the server.
Senders of mail bombs should be wary of exposing themselves to
reciprocal mail bombs or to legal actions.
9. Bug Exploits
An exploit is a piece of software, a chunk of data, or a sequence of
commands that takes advantage of a bug, glitch or vulnerability in
order to cause unintended or unanticipated behavior to occur on
computer software, hardware, or something electronic (usually
computerized).
Such behavior frequently includes things like gaining control of a
computer system.
10.Spam
Spam or Junk mail, is the (unwanted) sending out of mass emails for
commercial or fraudulent purposes, which is unethical and illegal.
Anti- Spam laws are being enforced in most countries which will hopefully
limit the use of annoying electronic communications.
11.Spying
Credit Card copying (Skimming) is another cyber crime that comes under
spying as well as fraud.
As a person swipes his card at the ATM, or presents his card at a restaurant
or shop for billing, the swipe machine may have a skimmer attached to it
which transfers confidential information to the card to a third party, other
than the credit card company
12.Offensive contents
Obscenity becomes a criminal activity where creating, distributing,
accessing and spreading obscene material exploits human beings in any
manner, especially when it is accessed by children.
2. Report to Management
All incidents should be reported to management as soon as possible. Prompt
internal reporting is imperative to collect and preserve potential evidence. It is
important that information about the investigation be limited to as few people as
possible.
5. Surveillance
Two forms of surveillance are used in computer crime investigations: physical
and computer.
Physical surveillance can be generated at the time of the abuse, through
CCTV security cameras, or after the fact.
Computer surveillance is achieved in a number of ways. It is done
passively through audit logs or actively by way of electronic monitoring.
The goal of the investigation is to identify all available facts related to the
case. The investigative report should provide a detailed account of the incident,
highlighting any discrepancies in witness statements.
4.3 Introduction Cyber Laws- Introduction to IT act 2000 and IT act 2008,
Introduction to the cyber laws
"The modern thief can steal more with a computer than with a gun. Tomorrow's
terrorist may be able to do more damage with a keyboard than with a bomb".
Internet has dramatically changed the way we think, the way we govern, the way
we do commerce and the way we perceive ourselves.
Information technology is encompassing all walks of life all over the world.
Cyber space creates moral, civil and criminal wrongs. It has now given a new
way to express criminal tendencies.
Cyberspace is open to participation by all
“IT” has brought Transition from paper to paperless world
The laws of real world cannot be interpreted in the light of emerging cyberspace
to include all aspects relating to different activities in cyberspace
Internet requires an enabling and supportive legal infrastructure in tune with the
times
Cyber Law
Cyber space: It includes computers, networks, software's, data storage devices (such as
hard disks, USB disks etc), the Internet, websites, emails and even electronic devices such
as cell phones, ATM machines etc.
Cyber Crimes
Electronic or Digital Signatures
Intellectual Property
Data Protection and Privacy
IT Act-2000:
Due to misuse of internet & increase of cyber crimes, the Govt. of India made a act for
safeguarding the internet users. And this is IT act 2000. Also known as ITA2000
The Information Technology Act, 2000 (IT Act), came into force on 17 October 2000.
The primary purpose of the Act is to provide legal recognition to electronic commerce
and to facilitate filing of electronic records with the Government.
Information Technology Act 2000 consisted of 94 sections segregated into 12 chapters.
Objectives & scope of ITact2000:
Chapters of IT act2000
Advantages of IT act2000:
Disadvantages of IT act2000:
IT Act Amendment-2008:
The modification are made to address some issues like the original bill failed to cover, to
accommodate the development of IT Industries & security of e-commerce transaction.
Redefinitions of terms like communication device which reflect the current use.
The owner of an IP address is responsible for content that are accessed or distributed through it.