August
1999 QUESTION 5 Total Marks: 20 Marks |
Click here to access other
questions
Click to access |
(a) | Identify and explain the two approaches used
in cascading authentication in distributed systems.
|
[4] |
(b) | Name any two Specific and Pervasive security
mechanisms used in networks.
|
[4] |
(c) | Explain any three practical approaches used to
gain the management approval for the security program with in an organization.
|
[6] |
(d) | Name the three main activities involved in
network risk analysis.
|
[3] |
(e) | Explain briefly the three sub-activities of
economic assessment as a part of risk analysis.
|
[3] |