0% found this document useful (0 votes)
462 views1 page

IS Assignment-1

This document discusses various security concepts across four questions: 1. It asks which security services are guaranteed for different mail delivery methods like regular mail, certified mail, etc. 2. It discusses the security mechanisms provided by student identification/password requirements, automatic logouts, and requiring student IDs for grade emails. 3. It asks the reader to define the type of security attack described in cases involving stealing a test, check forgery, and sending phony emails. 4. It asks the reader to identify whether cryptography or steganography is being used in cases like hiding notes in a pen, replacing characters in a message, using special ink, and using watermarks to
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
462 views1 page

IS Assignment-1

This document discusses various security concepts across four questions: 1. It asks which security services are guaranteed for different mail delivery methods like regular mail, certified mail, etc. 2. It discusses the security mechanisms provided by student identification/password requirements, automatic logouts, and requiring student IDs for grade emails. 3. It asks the reader to define the type of security attack described in cases involving stealing a test, check forgery, and sending phony emails. 4. It asks the reader to identify whether cryptography or steganography is being used in cases like hiding notes in a pen, replacing characters in a message, using special ink, and using watermarks to
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 1

Assignment-1

1. Which security service(s) are guaranteed when using each of the following methods to
send mail at the post office?
a. Regular mail
b. Regular mail with delivery confirmation
c. Regular mail with delivery and recipient signature
d. Certified mail
e. Insured mail
f. Registration mail

2. Which security mechanism(s) are provided in each of the following cases?


a. A school demands student identification and a password to let students log into the school
server.
b. A school server disconnects a student if she is logged into the system for more than two
hours.
c. A professor refuses to send students their grades by e-mail unless they provide student
identification they were pre-assigned by the professor.

3. Define the type of security attack in each of the following cases:

i. A student breaks into professor’s office to obtain a copy of the next day’s test.

ii. A student gives a check for $10 to buy a used book. Later she finds that the check was
cashed for $100.

iii. A student sends hundreds of e‐mails per day to another student using phony return e‐mail
address.

4. Which technique (cryptography or steganography) is used in each of the following cases


for confidentiality?

a) A student writes the answers to a test on a small piece of paper, rolls up the paper, and inserts
in a ball‐point pen, and passes the pen to another student.

b) To send a message, a spy replaces each character in the message with a symbol that was
agreed upon in advance as a character’s replacement.

c) A company uses special ink on its checks to prevent forgeries.

d) A graduate student uses watermarks to protect her thesis, which is posted on her website.

You might also like