August 1999
SC223 : COMPUTER SECURITY

QUESTION 5

Total Marks: 20 Marks

Click here to access other questions

Click to access
SUGGESTED SOLUTIONS
for Question 5

(a) Identify and explain the two approaches used in cascading authentication in distributed systems.

 

[4]
(b) Name any two Specific and Pervasive security mechanisms used in networks.

 

[4]
(c) Explain any three practical approaches used to gain the management approval for the security program with in an organization.

 

[6]
(d) Name the three main activities involved in network risk analysis.

 

[3]
(e) Explain briefly the three sub-activities of economic assessment as a part of risk analysis.

 

[3]