August
1999 QUESTION 5 Total Marks: 20 Marks |
Click here to access other
questions
SUGGESTED SOLUTIONS |
(a) | Identify and explain the two approaches used in cascading authentication in distributed systems. | [4] |
Trusted Path
Propagation: A propagation of a trusted path is assumed when the processes are permitted
to pass the identification and authentication information to other processes and
components. Privilege Passing: privileges are permitted to propagate among the
distributed, co-operative and intelligent system, that lead to security risks evident to
system resources and data.
|
||
(b) | Name any two Specific and Pervasive security mechanisms used in networks. | [4] |
Specific security
mechanisms:
Pervasive security mechanisms:
|
|
|
(c) | Explain any three practical approaches used to gain the management approval for the security program with in an organization. | [6] |
Any three of the
following:
|
||
(d) | Name the three main activities involved in network risk analysis. | [3] |
Sensitivity
assessment; risk assessment; and economic assessment.
|
||
(e) | Explain briefly the three sub-activities of economic assessment as a part of risk analysis. | [3] |
|