Friday 27 November 2015

Blog 4 - Safety of Transfer Methods

For this final blog post, you need to assess the safety and suitability of the methods that we have used to exchange information. In separate paragraphs, please comment on the suitability of using the college emails to exchange forensic information, and then using this public blog to exchange forensic information.

Your post should take in to consideration:

  • The information that we have been sharing and the sensitivity of any possible personal information of people involved in the crime
  • Who can add to the information or edit the information that is shared
  • How much effort it would take to access the information that is shared
  • What methods of encryption does each method use to avoid unauthorised access
This blog post should be approximately 300 words long.

6 comments:

  1. One of the ways we have been communicating is through college emails. This is a good way to communicate because the messages are only visible to the intended recipient and cannot be edited. The information that is being shared is fairly sensitive because it all matters to our investigations and what we have discovered. It would take a lot of effort to access the information shared because emails use lots of software like firewalls and passwords to prevent other people gaining access to your account and going through personal information.
    The second way that we have been communicating is through the blog. The way to add to the blog is through comments and the only way to publish them is by logging into an account but they still cannot edit other peoples’ work. This prevents unknown people from posting things on the blog and can help the blog creator stop them from posting again if it interferes with the work. The blog doesn’t use much encryption as stated before where anybody can post on to it.
    In conclusion the college email is by far the better option because while the blog allows everyone on the course to see the information it also allows completely unknown people to also see the information and even comment on it. Whereas on the other hand the emails are private information only visible to the sender and recipient. This information is plastered with protection and would take a lot of effort to decrypt.

    ReplyDelete
  2. This comment has been removed by the author.

    ReplyDelete
  3. the first way of communicating is through the collage email. This is a good way of communicating to overs to exchange information and share ideas. This is because your emails are private and secure so only the person who is intended to receive your email will get it. it is also good because it means no one can change the information what is in the email. this means no modifications or false information you don't want to be in the email will be there. This is good because the information we are sharing to each other takes time and a lot of patients to try and find so it's good that other people can't access or information due to all the security features the collage email has. For example it makes you change your password after a certain amount of time.
    The second way we have been sharing our forensic information is via the "blog". the way we share our information is adding a comment which everyone can see and anyone can lead a comment to it. Also its not the best because the creator can remove anything they want. In ways it is a good way to communicate because no one can edit your post and you still need a account to post information. But the blog is not as secure as the collage email is.
    in conclusion i believe that the collage email is more secure this is due to the amount of security features it has. Also the information you send is private and cannot be edited and has a lot more firewalls which means it would be less vulnerable to a cyber attack compared to the blog.

    ReplyDelete
  4. The first way that everyone has been communicating there information is through the blog. The information that gets posted on here is public for anyone to come and see but without sufficient knowledge on how to do so. You couldn’t change what a person has posted on the blog. The creator of the blog can remove a comment, or a person that has written a comment can remove a comment. Also to comment on the blog you have to sign into an account so unless you give that information to someone or someone gets into that account they cannot edit or remove what you have said.
    The second way that we have been communicating this information is through email. This way of communication is more personal and the only people that can see it is the person that sent the email and the person that edited the email. This is better because it would take a lot more effort just to see the information that is being sent through to one another and what is sent cannot be edited.
    The information that is getting sent to one another is not that privet information though. Anyone can assess it if they spent a little time on the internet and do their own research. In conclusion I would say that the better way of sending information to each other is through email because less people can see the information and also no one can edit a sent email the can only assess the your account and email a new email. Also to get into someone account and read their emails (sent or received) takes a lot of skill and knowledge on how encryption works.

    ReplyDelete
  5. We have been communicating about this assignment in two slightly different ways, allowing us to share information with both our teacher and the rest of the class.
    The first method of communication which we have been using is the blog; the blog is a quick and easy method of sharing information to both the class and our teacher, however, by sharing information in this format it allows anyone with the blog web address to access the information. Despite this, the information in which we have been sharing is not overly sensitive and isn’t overly important, however, if we were to share information using this method for an actual case then we would have to make it more secure, to prevent the general public stumbling over vital case information being shared.
    The second method of how we have been communicating is via email. This method is seen as a lot more secure than the previous method because it is just between the people who have access to the email. Despite this emails are not always secure due to the fact that they can be hacked, however this is very rare. Out of the two methods that we have been communicating, the email is the more secure one and allows for a quick and easy transfer of information.

    ReplyDelete
  6. One of the ways that we were communicating through was the blog. Once a blog post was posted it couldn't be changed by anyone other than the person who posted it or by the person who has set up the blog. This method of sharing information is an easy, fast and effective way of communicating. The blog is open for anyone to go on and look at but the information being shared here is information that can easily be found elsewhere and the information its self isn’t of a sensitive nature
    The other way that we have been communicating is through emails. This method of communication is much more private than the blog, and the information that is sent through emails can only be seen by the person who has sent it and the person who has received it. The information that is sent through emails cannot be edited once sent.

    ReplyDelete