You are on page 1of 2

Assignment 1

CS 547- Cryptography and Computer Security


Name: Manisha Nishtala
TNO: 00635729
6. Which security services are guaranteed when using each of the following methods to
send mail at the post office?
a) Regular mail: Regular mail is used to send letters and packages. No security services are
guaranteed with this.
b) Regular mail with delivery confirmation: A Regular mail with delivery confirmation is a
sort of mail service which delivers mails with a confirmation of the delivery. No security
services are guaranteed with this.
c) Regular mail with delivery and recipient signature: This mail is like Regular mail with
delivery confirmation but also comes with recipient signature. No security services are
guaranteed with this.
d) Certified mail: It provides a mailing receipt, and a record of delivery is kept at the recipient’s
post office. A return receipt to provide the sender with proof of delivery can also be purchased
for an additional fee.
1. Authenticity
2. Non- repudiation.
e) Insured mail: A receipt of delivery is signed by the recipient and filed at the delivery post
office.
1. Authenticity
2. Non- repudiation.
f) Registered mail: Registered mail is the most secure option offered by the Postal Service. It
provides added protection for valuable and important mail. Registered articles are placed under
tight security from the point of mailing to the delivery office.
1. Authenticity
2. Non- repudiation
3. Integrity.
4. Confidentiality.
7. Define the type of security attack in each of the following cases:
a. A student breaks into a professor’s office to obtain a copy of the next day’s test
This is a type of confidentiality attack because an unauthorized student intrudes into the
professor’s room to obtain personal information. This is confidential information because the test
questions should be maintained as a secret until the day of the exam.
b. A student gives a check for $10 to buy a used book. Later she finds that the check was cashed
for $100.
This a type of integrity attack because the check has been altered by a student, who does not
have the permission to do that. This questions the person’s honesty.
c. A student send hundreds of e-mails per day to another student using a phony return e-mail
address.
This attack is an availability attack because sending a huge amount of emails on the same
server can result in crashing of server and compromise its availability.

You might also like