The document discusses different methods for sending mail through the post office and the security services guaranteed with each method. Regular mail provides no security services, while certified mail, insured mail, and registered mail provide authenticity and non-repudiation. Registered mail additionally guarantees integrity and confidentiality. The document also defines types of security attacks, identifying a student obtaining a test as a confidentiality attack, altering a check amount as an integrity attack, and sending large amounts of emails as an availability attack.
The document discusses different methods for sending mail through the post office and the security services guaranteed with each method. Regular mail provides no security services, while certified mail, insured mail, and registered mail provide authenticity and non-repudiation. Registered mail additionally guarantees integrity and confidentiality. The document also defines types of security attacks, identifying a student obtaining a test as a confidentiality attack, altering a check amount as an integrity attack, and sending large amounts of emails as an availability attack.
The document discusses different methods for sending mail through the post office and the security services guaranteed with each method. Regular mail provides no security services, while certified mail, insured mail, and registered mail provide authenticity and non-repudiation. Registered mail additionally guarantees integrity and confidentiality. The document also defines types of security attacks, identifying a student obtaining a test as a confidentiality attack, altering a check amount as an integrity attack, and sending large amounts of emails as an availability attack.
The document discusses different methods for sending mail through the post office and the security services guaranteed with each method. Regular mail provides no security services, while certified mail, insured mail, and registered mail provide authenticity and non-repudiation. Registered mail additionally guarantees integrity and confidentiality. The document also defines types of security attacks, identifying a student obtaining a test as a confidentiality attack, altering a check amount as an integrity attack, and sending large amounts of emails as an availability attack.
Name: Manisha Nishtala TNO: 00635729 6. Which security services are guaranteed when using each of the following methods to send mail at the post office? a) Regular mail: Regular mail is used to send letters and packages. No security services are guaranteed with this. b) Regular mail with delivery confirmation: A Regular mail with delivery confirmation is a sort of mail service which delivers mails with a confirmation of the delivery. No security services are guaranteed with this. c) Regular mail with delivery and recipient signature: This mail is like Regular mail with delivery confirmation but also comes with recipient signature. No security services are guaranteed with this. d) Certified mail: It provides a mailing receipt, and a record of delivery is kept at the recipient’s post office. A return receipt to provide the sender with proof of delivery can also be purchased for an additional fee. 1. Authenticity 2. Non- repudiation. e) Insured mail: A receipt of delivery is signed by the recipient and filed at the delivery post office. 1. Authenticity 2. Non- repudiation. f) Registered mail: Registered mail is the most secure option offered by the Postal Service. It provides added protection for valuable and important mail. Registered articles are placed under tight security from the point of mailing to the delivery office. 1. Authenticity 2. Non- repudiation 3. Integrity. 4. Confidentiality. 7. Define the type of security attack in each of the following cases: a. A student breaks into a professor’s office to obtain a copy of the next day’s test This is a type of confidentiality attack because an unauthorized student intrudes into the professor’s room to obtain personal information. This is confidential information because the test questions should be maintained as a secret until the day of the exam. b. A student gives a check for $10 to buy a used book. Later she finds that the check was cashed for $100. This a type of integrity attack because the check has been altered by a student, who does not have the permission to do that. This questions the person’s honesty. c. A student send hundreds of e-mails per day to another student using a phony return e-mail address. This attack is an availability attack because sending a huge amount of emails on the same server can result in crashing of server and compromise its availability.