100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Instructor Manual Principles of Information Security, 7th Edition by Michael E. Whitman ||Complete A+ Guide

Rating
-
Sold
-
Pages
325
Grade
A+
Uploaded on
03-11-2024
Written in
2024/2025

Instructor Manual Principles of Information Security, 7th Edition by Michael E. Whitman ||Complete A+ Guide

Institution
Principles Of Information Security, 7th Edition
Course
Principles Of Information Security, 7th Edition











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Principles Of Information Security, 7th Edition
Course
Principles Of Information Security, 7th Edition

Document information

Uploaded on
November 3, 2024
Number of pages
325
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • information security

Content preview

Instructor fManual: fWhitman fand fMattord, fPrinciples fof fInformation fSecurity f7e, fISBN f978-0-357-50643-1; fModule f1: fIntroduction fto
Information fSecurity




InstructorManual f




Whitman and Mattord, Principles of Information Security 7e, ISBN 978-0-357-50643-1; Module 1:
f f f f f f f f f f f


Introduction to Information Security
f f f f




Table of Contents f f




Purpose and Perspective of the Module ........................................................................................ 2
f f f f f



Cengage Supplements ................................................................................................................ 2
f



Module Objectives ....................................................................................................................... 2
f



Complete List of Module Activities and Assessments..................................................................... 2
f f f f f f



Key Terms ................................................................................................................................... 3
f



What's New in This Module .......................................................................................................... 4
f f f f



Module Outline ............................................................................................................................ 4
f



Discussion Questions ................................................................................................................ 15
f



Suggested Usage for Lab Activities ............................................................................................ 16
f f f f



Additional Activities and Assignments ......................................................................................... 17
f f f



Additional Resources ................................................................................................................. 17
f



Cengage Video Resources .............................................................................................................................. 17
f f



Internet Resources ......................................................................................................................................... 17
f



Appendix ................................................................................................................................... 18
Grading Rubrics .............................................................................................................................................. 18
f




© f2022 fCengage. fAll fRights fReserved. fMay fnot fbe fscanned, fcopied for fduplicated, for fposted fto fa fpublicly 1
faccessible f website, fin fwhole for fin fpart.

, Instructor fManual: fWhitman fand fMattord, fPrinciples fof fInformation fSecurity f7e, fISBN f978-0-357-50643-1; fModule f1: fIntroduction fto
Information fSecurity


Purpose and Perspective of the Module f f f f f




The first module of the course in information security provides learners the foundational
f f f f f f f f f f f f


knowledge to become well versed in the protection systems of any size need within an
f f f f f f f f f f f f f f f


organization today. The module begins with fundamental knowledge of what information security
f f f f f f f f f f f f


is and the how computer security evolved into what we know now as information security today.
f f f f f f f f f f f f f f f f


Additionally, learners will gain knowledge on the how information security can be viewed either as
f f f f f f f f f f f f f f f


an art or a science and why that is the case.
f f f f f f f f f f f




Cengage Supplements f




The following product-level supplements are available in the Instructor Resource Center and provide
f f f f f f f f f f f f


additional information that may help you in preparing your course:
f f f f f f f f f f



 PowerPoint slides f


 Test banks, available in Word, as LMS-ready files, and on the Cognero platform
f f f f f f f f f f f f


 MindTap Educator Guide f f


 Solution and Answer Guide f f f


 This instructor‘s manualf f




Module Objectives f




The following objectives are addressed in this module:
f f f f f f f



1.1 Define information security. f f



1.2 Discuss the history of computer security and explain how it evolved into information
f f f f f f f f f f f f


security.
f



1.3 Define key terms and critical concepts of information security.
f f f f f f f f



1.4 Describe the information security roles of professionals within an organization.
f f f f f f f f f




Complete List of Module Activities and Assessments f f f f f f




For additional guidance refer to the MindTap Educator Guide.
f f f f f f f f




Module PPT slide f Activity/Assessment Duration
Objective
f



2 Icebreaker: Interview Simulation f f 10 minutes f


1.1–1.2 19–20 Knowledge Check Activity 1 f f f 2 minutes f


1.3 34–35 Knowledge Check Activity 2 f f f 2 minutes f


1.4 39–40 Knowledge Check Activity 3 f f f 2 minutes f


1.1–1.4 MindTap Module 01 Review Questions f f f 30–40 minutes f


1.1 –1.4 f f MindTap Module 01 Case Exercises f f f 30 minutes f


1.1 –1.4 f f MindTap Module 01 Exercises f f 10–30 minutes per f f


question; 1+ hour f f


per module
f f


1.1 –1.4 f f MindTap Module 01 Security for Life f f f f 1+ hour f


1.1 –1.4 f f MindTap Module 01 Quiz f f 10–15 minutes f



[return to top] f f




© f2022 fCengage. fAll fRights fReserved. fMay fnot fbe fscanned, fcopied for fduplicated, for fposted fto fa fpublicly 2
faccessible f website, fin fwhole for fin fpart.

, Instructor fManual: fWhitman fand fMattord, fPrinciples fof fInformation fSecurity f7e, fISBN f978-0-357-50643-1; fModule f1: fIntroduction fto
Information fSecurity


Key Terms f




In order of use:
f f f



computer security: In the early days of computers, this term specified the protection of the
f f f f f f f f f f f f f f


physical location and assets associated with computer technology from outside threats, but it later
f f f f f f f f f f f f f f


came to represent all actions taken to protect computer systems from losses.
f f f f f f f f f f f f



security: A state of being secure and free from danger or harm as well as the actions taken to make
f f f f f f f f f f f f f f f f f f f


someone or something secure.
f f f f



information security: Protection of the confidentiality, integrity, and availability of information
f f f f f f f f f f


assets, whether in storage, processing, or transmission, via the application of policy, education,
f f f f f f f f f f f f f


training and awareness, and technology.
f f f f f



network security: A subset of communications security; the protection of voice and data networking
f f f f f f f f f f f f f


components, connections, and content.
f f f f



C.I.A. triad: The industry standard for computer security since the development of the
f f f f f f f f f f f f


mainframe; the standard is based on three characteristics that describe the attributes of
f f f f f f f f f f f f f


information that are important to protect: confidentiality, integrity, and availability.
f f f f f f f f f f



confidentiality: An attribute of information that describes how data is protected from disclosure or f f f f f f f f f f f f f


exposure to unauthorized individuals or systems.
f f f f f f



personally identifiable information (PII): Information about a person‘s history, background,
f f f f f f f f f


and attributes that can be used to commit identity theft that typically includes a person‘s name,
f f f f f f f f f f f f f f f f


address, Social Security number, family information, employment history, and financial
f f f f f f f f f f


information.
f



integrity: An attribute of information that describes how data is whole, complete, and
f f f f f f f f f f f f


uncorrupted.
f



availability: An attribute of information that describes how data is accessible and correctly formatted
f f f f f f f f f f f f f


for use without interference or obstruction.
f f f f f f



accuracy: An attribute of information that describes how data is free of errors and has the value that
f f f f f f f f f f f f f f f f f


the user expects.
f f f



authenticity: An attribute of information that describes how data is genuine or original rather than
f f f f f f f f f f f f f f


reproduced or fabricated.
f f f



utility: An attribute of information that describes how data has value or usefulness for an end
f f f f f f f f f f f f f f f


purpose.
f



possession: An attribute of information that describes how the data‘s ownership or control is
f f f f f f f f f f f f f


legitimate or authorized.
f f f



McCumber Cube: A graphical representation of the architectural approach used in computer
f f f f f f f f f f f


and information security that is commonly shown as a cube composed of 3×3×3 cells, similar to a
f f f f f f f f f f f f f f f f f


Rubik‘s Cube.
f f



information system: The entire set of software, hardware, data, people, procedures, and
f f f f f f f f f f f


networks that enable the use of information resources in the organization.
f f f f f f f f f f f



physical security: The protection of material items, objects, or areas from unauthorized access and
f f f f f f f f f f f f f


misuse.
f




© f2022 fCengage. fAll fRights fReserved. fMay fnot fbe fscanned, fcopied for fduplicated, for fposted fto fa fpublicly 3
faccessible f website, fin fwhole for fin fpart.

, Instructor fManual: fWhitman fand fMattord, fPrinciples fof fInformation fSecurity f7e, fISBN f978-0-357-50643-1; fModule f1: fIntroduction fto
Information fSecurity

bottom-up approach: A method of establishing security policies and/or practices that begins as a
f f f f f f f f f f f f f


grassroots effort in which systems administrators attempt to improve the security of their systems.
f f f f f f f f f f f f f f



top-up approach: A methodology of establishing security policies and/or practices that is initiated
f f f f f f f f f f f f


by upper management.
f f f



chief information officer (CIO): An executive-level position that oversees the organization‘s
f f f f f f f f f f


computing technology and strives to create efficiency in the processing and access of the
f f f f f f f f f f f f f f


organization‘s information.
f f



chief information security officer (CISO): The title typically assigned to the top information security
f f f f f f f f f f f f f


manager in an organization.
f f f f



data owners: Individuals who control and are therefore ultimately responsible for the security and
f f f f f f f f f f f f f


use of a particular set of information.
f f f f f f f



data custodians: Individuals who are responsible for the storage, maintenance, and protection of
f f f f f f f f f f f f


information.
f



data stewards: See data custodians.
f f f f



data trustees: Individuals who are assigned the task of managing a particular set of information and
f f f f f f f f f f f f f f f


coordinating its protection, storage, and use.
f f f f f f



data users: Internal and external stakeholders (customers, suppliers, and employees) who
f f f f f f f f f f


interact with information in support of their organization‘s planning and operations.
f f f f f f f f f f f



community of interest: A group of individuals who are united by similar interests or values
f f f f f f f f f f f f f f


within an organization and who share a common goal of helping the organization to meet its
f f f f f f f f f f f f f f f f


objectives.
f



[return to top] f f




What's New in This Module f f f f




The following elements are improvements in this module from the previous edition:
f f f f f f f f f f f



 This Module was Chapter 1 in the 6th edition.
f f f f f f f f


 The content that covered Systems Development was moved to Module 11:
f f f f f f f f f f


Implementation.
f


 The Module was given a general update and given more current examples.
f f f f f f f f f f f



[return to top] f f




Module Outline f




Introduction to Information Security (1.1, 1.2, PPT Slides 4–17) f f f f f f f f



I. Recognize that organizations, regardless of their size or purpose, have information they f f f f f f f f f f f


must protect and store internally and externally.
f f f f f f f



II. Analyze the importance and reasoning an organization must be responsible for thef f f f f f f f f f f


information they collect, store, and use.
f f f f f f



III. Review the concept of computer security and when the need for it initially arose.
f f f f f f f f f f f f f




© f2022 fCengage. fAll fRights fReserved. fMay fnot fbe fscanned, fcopied for fduplicated, for fposted fto fa fpublicly 4
faccessible f website, fin fwhole for fin fpart.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Ascorers Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
895
Member since
1 year
Number of followers
59
Documents
3655
Last sold
11 hours ago
ASCORERSHUB

Welcome to your one-stop destination for high-quality academic resources! Here you’ll find test banks, solution manuals, ATI study guides, iHuman case studies, nursing exam prep materials, and verified textbook answers — all carefully selected to help you study smarter and score higher. Whether you’re preparing for nursing exams, business courses, medical case studies, or general college tests, this store offers reliable, up-to-date materials used by top students worldwide. Popular categories include: ✅ Test Banks & Solution Manuals ✅ ATI & HESI Study Guides ✅ iHuman Case Studies & Answers ✅ NCLEX & Nursing Exam Prep ✅ Business, Accounting & Economics Test Banks ✅ Psychology, Biology & Anatomy Materials Boost your academic performance with expertly curated resources that match real exams and class content.

Read more Read less
4.8

1078 reviews

5
963
4
47
3
45
2
9
1
14

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions