Skip to main content

Security Tool 2 (Data Recovery Tools) - Group C

      


     2.0         Background of Data Recovery

Data recovery is the process of restoring data that has been lost, accidentally deleted, corrupted, or made inaccessible. Data recovery is needed because of data loss. Most common causes of data loss include accidental deletion of files or folders, file system formatting, logical damage to the file system and storage failure. The data recovery process relies on backups to work. Without a backup, you would need to rebuild lost data from scratch, which could take a lot of time and effort.

The first known data recovery attempt dates back to the first programmable computer, created in the 1800s. The developers of the earliest programmable analogue computer, the English polymath Charles Babbage and English mathematician and writer Ada Lovelace, were also the first to attempt data recovery.

The data recovery tools chosen is MiniTool Power Data Recovery is a dedicated file recovery tool that can work on all versions of Windows. It can recover lost or deleted files like images, videos, music files, documents, emails, and more from different types of data storage devices. This MiniTool data recovery software can rescue files even when the hard drive is inaccessible, the system crashes, or the files get lost due to a virus attack.

2.1 Installation and demo manual

Get the Mini Tool Data Recovery at the official website https://www.minitool.com/data-recovery-software/An exe file will be downloaded.



Click install now.


Common use cases of MiniTool for recovering deleted files.

Delete a file, and check it in the recycle bin.

Delete the file from the recycle bin.


Start the MiniTool Recovery Tool, Select Recycle Bin for recovery.


The deleted file “Test MiniTool Recovery.rtf” is found. Click save to recover the file.


Select a directory to recover the file. Click OK.


The file is successfully recovered.

2.2 CIA (Confidentiality, Integrity, and Availability)

  • Authentication
    MiniTool Power Data Recovery does not possess any form of method that can be used to authenticate the user that is accessing the software. Any user that is using the device that MiniTool Power Data Recovery is installed can access and use the software. The user authentication process is mainly through the users’ device authentication, whether it is through password-based authentication, biometric authentication and so on.  

  • Confidentiality

    MiniTool Power Data Recovery cannot just simply recover the disks or files that is encrypted with data protection feature such as BitLocker. Only the user knows or possess the password for the BitLocker encryption. This is to ensure that only the users of that particular drive or files can have access and recovers the lost files. 

  • Integrity
    MiniTool Power Data Recovery supports the recovery of corrupted and lost files or drives that is the results of multiple reasons. The reasons include accidental deletion, hard drive damage, virus attacks, operation system crash and formatting. It not only helps you recover deleted files, but also recovers data from damaged, reformatted hard drive as well. Furthermore, MiniTool Power Data Recovery not only recovers data from hard disk and RAID device, but also supports to recover data from CD, DVD disks, memory card, memory stick, and flash drive. As a data recovery software suite, MiniTool Power Data Recovery includes five data recovery modules - Undelete Recovery, Damaged Partition Recovery, Lost Partition Recovery, Digital Media Recovery and CD/DVD Recovery. Each data recovery module focuses on different data loss condition.

  • Availability
    MiniTool provides the free option for users to download. It is also supported on Windows, Android and IOS. This means that users can use MiniTool in both computer device (Windows) and mobile device (Android/IOS). MiniTool Power Data Recovery covers all storage devices for data restoration such as hard drives (SSD, HDD), flash drives and also SD card / memory card.









Comments

Popular posts from this blog

Security Tool 1 (Encryption Tools) - Group C

       1.0      Background of Encryption Tools Encryption is a protection method that uses an internet-based algorithm key to obscure data from any unverified viewers. Encryption tools change the data during transfer so that individuals who see the data afterward can't understand or access it without the key. Once the data arrives at an intended destination, you can also use tools to decode messages so they're readable again. For the encryption tool “LastPass”, it used to secure an account begins the moment it’s created. When a user creates their master password, it’s used to generate a unique encryption key, even when enabling passwordless login. The master password and the encryption key are never sent to or shared with LastPass. 1.1             Installation and demo manual Get LastPass for free at the official website https://www.lastpass.com/ Create an Account Add LastPass Chrome Extension Dashboard of LastPass. Try import password to LastPass. Select google chrome icon

Security Tool 3 (Email Application) - Group C

  3.1          Background Subtopic Electronic mail, commonly shortened to “email,” is a communication method that uses electronic devices to deliver messages across computer networks. "Email" refers to both the delivery system and individual messages that are sent and received. Email has existed in some form since the 1970s, when programmer Ray Tomlinson created a way to transmit messages between computer systems on the Advanced Research Projects Agency Network (ARPANET). Modern forms of email became available for widespread public use with the development of email client software (e.g. Outlook) and web browsers, the latter of which enables users to send and receive messages over the Internet using web-based email clients (e.g. Gmail). Gmail is a free web-based email service provided by Google. It allows users to send and receive e-mail over the Internet. It provides 15 GB of storage which is shared across Gmail, Google Drive, and Google Photos for each Google account. It als

Analysis On CIA Between The Selected Tools - Group C

  LastPass (Encryption Tool) Mini Tool (Data Recovery Tool) Email (Email Application) Confidentiality LastPass’s user are protected through LastPass’ zero-knowledge security model. Zero-knowledge means that no one has access to user decrypted Master Password, vault, or vault data except the account owner. To ensure that only authorized access is granted to user vault, we use industry-standard mechanisms, such as AES-256 encryption and PBKDF2 hashing plus salting, to keep user Master Password safe. This is an industry standard that all password managers should adhere to. MiniTool Power Data Recovery cannot just simply recover the disks or files that is encrypted with data protection feature such as BitLocker. Only the user knows or possess the password for the BitLocker encryption. This is to ensure that only the users of that particular drive or files can have access and recovers the lost f