100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

Instructor Manual Principles of Information Security, 7th Edition by Michael E. Whitman

Beoordeling
-
Verkocht
-
Pagina's
569
Cijfer
A+
Geüpload op
31-07-2025
Geschreven in
2024/2025

Instructor Manual Principles of Information Security, 7th Edition by Michael E. Whitman

Instelling
Instructor Manual Principles Of Information Secur
Vak
Instructor Manual Principles of Information Secur











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
Instructor Manual Principles of Information Secur
Vak
Instructor Manual Principles of Information Secur

Documentinformatie

Geüpload op
31 juli 2025
Aantal pagina's
569
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

Instructor Manual
Principles of Information Security,
7th Edition by Michael E. Whitman

,Instructor Manual 58


Whitman58and58Mattord,58Principles58of58Information58Security587e,58ISBN58978-0-357-50643-
1;58Module581:58Introduction58to58Information58Security

Table58of58Contents
Purpose58and58Perspective58of58the58Module ............................................................................. 2
Cengage58Supplements .............................................................................................................. 2
Module58Objectives ..................................................................................................................... 2
Complete58List58of58Module58Activities58and58Assessments ....................................................... 2
Key58Terms ................................................................................................................................. 3
What's58New58in58This58Module .................................................................................................. 4
Module58Outline .......................................................................................................................... 4
Discussion58Questions .............................................................................................................. 15
Suggested58Usage58for58Lab58Activities .................................................................................... 16
Additional58Activities58and58Assignments .................................................................................. 17
Additional58Resources ............................................................................................................... 17
Cengage58Video58Resources .................................................................................................................... 17
Internet58Resources ................................................................................................................................. 17
Appendix ................................................................................................................................... 18
Grading58Rubrics ..................................................................................................................................... 18

,Purpose58and58Perspective58of58the58Module
The58first58module58of58the58course58in58information58security58provides58learners58the58found
ational58knowledge58to58become58well58versed58in58the58protection58systems58of58any58size58
need58within58an58organization58today.58The58module58begins58with58fundamental58knowledge
58of58what58information58security58is58and58the58how58computer58security58evolved58into58wha
t58we58know58now58as58information58security58today.58Additionally,58learners58will58gain58know
ledge58on58the58how58information58security58can58be58viewed58either58as58an58art58or58a58scie
nce58and58why58that58is58the58case.

Cengage58Supplements
The58following58product-
level58supplements58are58available58in58the58Instructor58Resource58Center58and58provide58add
itional58information58that58may58help58you58in58preparing58your58course:
 PowerPoint58slides
 Test58banks,58available58in58Word,58as58LMS-
ready58files,58and58on58the58Cognero58platform
 MindTap58Educator58Guide
 Solution58and58Answer58Guide
 This58instructor‘s58manual

Module58Objectives
The58following58objectives58are58addressed58in58this58module:
1.1 Define58information58security.
1.2 Discuss58the58history58of58computer58security58and58explain58how58it58evolved58int
o58information58security.
1.3 Define58key58terms58and58critical58concepts58of58information58security.
1.4 Describe58the58information58security58roles58of58professionals58within58an58organization.

Complete58List58of58Module58Activities58and58Assessments
For58additional58guidance58refer58to58the58MindTap58Educator58Guide.

Module58 PPT58slide Activity/Assessment Duration
Objective
2 Icebreaker:58Interview58Simulation 1058minutes
1.1–1.2 19–20 Knowledge58Check58Activity581 258minutes
1.3 34–35 Knowledge58Check58Activity582 258minutes
1.4 39–40 Knowledge58Check58Activity583 258minutes
1.1–1.4 MindTap Module580158Review58Questions 30–4058minutes
1.158–581.4 MindTap Module580158Case58Exercises 3058minutes
1.158–581.4 MindTap Module580158Exercises 10–3058minutes58per
question;581+58hour5
8per58module
1.158–581.4 MindTap Module580158Security58for58Life 1+58hour
1.158–581.4 MindTap Module580158Quiz 10–1558minutes
[return58to58top]

, Key58Terms
In58order58of58use:
computer58security:58In58the58early58days58of58computers,58this58term58specified58the58prote
ction58of58the58physical58location58and58assets58associated58with58computer58technology58fro
m58outside58threats,58but58it58later58came58to58represent58all58actions58taken58to58protect58co
mputer58systems58from58losses.
security:58A58state58of58being58secure58and58free58from58danger58or58harm58as58well58as58the
58actions58taken58to58make58someone58or58something58secure.

information58security:58Protection58of58the58confidentiality,58integrity,58and58availability58of58infor
mation58assets,58whether58in58storage,58processing,58or58transmission,58via58the58application58of58
policy,58education,58training58and58awareness,58and58technology.
network58security:58A58subset58of58communications58security;58the58protection58of58voic
e58and58data58networking58components,58connections,58and58content.
C.I.A.58triad:58The58industry58standard58for58computer58security58since58the58developm
ent58of58the58mainframe;58the58standard58is58based58on58three58characteristics58that58de
scribe58the58attributes58of58information58that58are58important58to58protect:58confidentiality
,58integrity,58and58availability.
confidentiality:58An58attribute58of58information58that58describes58how58data58is58protected58fro
m58disclosure58or58exposure58to58unauthorized58individuals58or58systems.
personally58identifiable58information58(PII):58Information58about58a58person‘s58history,58bac
kground,58and58attributes58that58can58be58used58to58commit58identity58theft58that58typically58inc
ludes58a58person‘s58name,58address,58Social58Security58number,58family58information,58emplo
yment58history,58and58financial58information.
integrity:58An58attribute58of58information58that58describes58how58data58is58whole,58compl
ete,58and58uncorrupted.
availability:58An58attribute58of58information58that58describes58how58data58is58accessible58and58
correctly58formatted58for58use58without58interference58or58obstruction.
accuracy:58An58attribute58of58information58that58describes58how58data58is58free58of58errors58an
d58has58the58value58that58the58user58expects.
authenticity:58An58attribute58of58information58that58describes58how58data58is58genuine58or58ori
ginal58rather58than58reproduced58or58fabricated.
utility:58An58attribute58of58information58that58describes58how58data58has58value58or58usefulness58fo
r58an58end58purpose.
possession:58An58attribute58of58information58that58describes58how58the58data‘s58ownership58or58co
ntrol58is58legitimate58or58authorized.
McCumber58Cube:58A58graphical58representation58of58the58architectural58approach58used58in
58computer58and58information58security58that58is58commonly58shown58as58a58cube58composed
58of583×3×358cells,58similar58to58a58Rubik‘s58Cube.

information58system:58The58entire58set58of58software,58hardware,58data,58people,58proc
edures,58and58networks58that58enable58the58use58of58information58resources58in58the58or
ganization.
physical58security:58The58protection58of58material58items,58objects,58or58areas58from58unautho
rized58access58and58misuse.

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
favouredone Havard university
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
322
Lid sinds
1 jaar
Aantal volgers
31
Documenten
8656
Laatst verkocht
1 dag geleden
favoredone

Welcome to favoredone ! The place to find the best study materials for various subjects. You can be assured that you will receive only the best which will help you to ace your exams. All the materials posted are A+ Graded. Please rate and write a review after using my materials. Your reviews will motivate me to add more materials. Thank you very much!

4.4

339 beoordelingen

5
221
4
74
3
24
2
3
1
17

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen