Friday 27 November 2015

Blog 4 - Safety of Transfer Methods

For this final blog post, you need to assess the safety and suitability of the methods that we have used to exchange information. In separate paragraphs, please comment on the suitability of using the college emails to exchange forensic information, and then using this public blog to exchange forensic information.

Your post should take in to consideration:

  • The information that we have been sharing and the sensitivity of any possible personal information of people involved in the crime
  • Who can add to the information or edit the information that is shared
  • How much effort it would take to access the information that is shared
  • What methods of encryption does each method use to avoid unauthorised access
This blog post should be approximately 300 words long.

Friday 20 November 2015

Blog 3 - Validity of Sources

This week, your task is to choose 1 valid source and 1 invalid source that you have used to research your crime. In your post, you need to include a link to the website/article and an evaluation of why it is or isn't a valid source. Your evaluation should include sound reasoning of what makes a valid source and how you can decide if a source is valid. Your blog post should be approximately 200 words long to sufficiently explain the validity.