August
1999 QUESTION 5 Total Marks: 20 Marks |
Click here to access other
questions
Click to access |
| (a) | Identify and explain the two approaches used
in cascading authentication in distributed systems.
|
[4] |
| (b) | Name any two Specific and Pervasive security
mechanisms used in networks.
|
[4] |
| (c) | Explain any three practical approaches used to
gain the management approval for the security program with in an organization.
|
[6] |
| (d) | Name the three main activities involved in
network risk analysis.
|
[3] |
| (e) | Explain briefly the three sub-activities of
economic assessment as a part of risk analysis.
|
[3] |