Principles of Information Security,
7th Edition by Michael E. Whitman
,Instructor Manual 58
Whitman58and58Mattord,58Principles58of58Information58Security587e,58ISBN58978-0-357-50643-
1;58Module581:58Introduction58to58Information58Security
Table58of58Contents
Purpose58and58Perspective58of58the58Module ............................................................................. 2
Cengage58Supplements .............................................................................................................. 2
Module58Objectives ..................................................................................................................... 2
Complete58List58of58Module58Activities58and58Assessments ....................................................... 2
Key58Terms ................................................................................................................................. 3
What's58New58in58This58Module .................................................................................................. 4
Module58Outline .......................................................................................................................... 4
Discussion58Questions .............................................................................................................. 15
Suggested58Usage58for58Lab58Activities .................................................................................... 16
Additional58Activities58and58Assignments .................................................................................. 17
Additional58Resources ............................................................................................................... 17
Cengage58Video58Resources .................................................................................................................... 17
Internet58Resources ................................................................................................................................. 17
Appendix ................................................................................................................................... 18
Grading58Rubrics ..................................................................................................................................... 18
,Purpose58and58Perspective58of58the58Module
The58first58module58of58the58course58in58information58security58provides58learners58the58found
ational58knowledge58to58become58well58versed58in58the58protection58systems58of58any58size58
need58within58an58organization58today.58The58module58begins58with58fundamental58knowledge
58of58what58information58security58is58and58the58how58computer58security58evolved58into58wha
t58we58know58now58as58information58security58today.58Additionally,58learners58will58gain58know
ledge58on58the58how58information58security58can58be58viewed58either58as58an58art58or58a58scie
nce58and58why58that58is58the58case.
Cengage58Supplements
The58following58product-
level58supplements58are58available58in58the58Instructor58Resource58Center58and58provide58add
itional58information58that58may58help58you58in58preparing58your58course:
PowerPoint58slides
Test58banks,58available58in58Word,58as58LMS-
ready58files,58and58on58the58Cognero58platform
MindTap58Educator58Guide
Solution58and58Answer58Guide
This58instructor‘s58manual
Module58Objectives
The58following58objectives58are58addressed58in58this58module:
1.1 Define58information58security.
1.2 Discuss58the58history58of58computer58security58and58explain58how58it58evolved58int
o58information58security.
1.3 Define58key58terms58and58critical58concepts58of58information58security.
1.4 Describe58the58information58security58roles58of58professionals58within58an58organization.
Complete58List58of58Module58Activities58and58Assessments
For58additional58guidance58refer58to58the58MindTap58Educator58Guide.
Module58 PPT58slide Activity/Assessment Duration
Objective
2 Icebreaker:58Interview58Simulation 1058minutes
1.1–1.2 19–20 Knowledge58Check58Activity581 258minutes
1.3 34–35 Knowledge58Check58Activity582 258minutes
1.4 39–40 Knowledge58Check58Activity583 258minutes
1.1–1.4 MindTap Module580158Review58Questions 30–4058minutes
1.158–581.4 MindTap Module580158Case58Exercises 3058minutes
1.158–581.4 MindTap Module580158Exercises 10–3058minutes58per
question;581+58hour5
8per58module
1.158–581.4 MindTap Module580158Security58for58Life 1+58hour
1.158–581.4 MindTap Module580158Quiz 10–1558minutes
[return58to58top]
, Key58Terms
In58order58of58use:
computer58security:58In58the58early58days58of58computers,58this58term58specified58the58prote
ction58of58the58physical58location58and58assets58associated58with58computer58technology58fro
m58outside58threats,58but58it58later58came58to58represent58all58actions58taken58to58protect58co
mputer58systems58from58losses.
security:58A58state58of58being58secure58and58free58from58danger58or58harm58as58well58as58the
58actions58taken58to58make58someone58or58something58secure.
information58security:58Protection58of58the58confidentiality,58integrity,58and58availability58of58infor
mation58assets,58whether58in58storage,58processing,58or58transmission,58via58the58application58of58
policy,58education,58training58and58awareness,58and58technology.
network58security:58A58subset58of58communications58security;58the58protection58of58voic
e58and58data58networking58components,58connections,58and58content.
C.I.A.58triad:58The58industry58standard58for58computer58security58since58the58developm
ent58of58the58mainframe;58the58standard58is58based58on58three58characteristics58that58de
scribe58the58attributes58of58information58that58are58important58to58protect:58confidentiality
,58integrity,58and58availability.
confidentiality:58An58attribute58of58information58that58describes58how58data58is58protected58fro
m58disclosure58or58exposure58to58unauthorized58individuals58or58systems.
personally58identifiable58information58(PII):58Information58about58a58person‘s58history,58bac
kground,58and58attributes58that58can58be58used58to58commit58identity58theft58that58typically58inc
ludes58a58person‘s58name,58address,58Social58Security58number,58family58information,58emplo
yment58history,58and58financial58information.
integrity:58An58attribute58of58information58that58describes58how58data58is58whole,58compl
ete,58and58uncorrupted.
availability:58An58attribute58of58information58that58describes58how58data58is58accessible58and58
correctly58formatted58for58use58without58interference58or58obstruction.
accuracy:58An58attribute58of58information58that58describes58how58data58is58free58of58errors58an
d58has58the58value58that58the58user58expects.
authenticity:58An58attribute58of58information58that58describes58how58data58is58genuine58or58ori
ginal58rather58than58reproduced58or58fabricated.
utility:58An58attribute58of58information58that58describes58how58data58has58value58or58usefulness58fo
r58an58end58purpose.
possession:58An58attribute58of58information58that58describes58how58the58data‘s58ownership58or58co
ntrol58is58legitimate58or58authorized.
McCumber58Cube:58A58graphical58representation58of58the58architectural58approach58used58in
58computer58and58information58security58that58is58commonly58shown58as58a58cube58composed
58of583×3×358cells,58similar58to58a58Rubik‘s58Cube.
information58system:58The58entire58set58of58software,58hardware,58data,58people,58proc
edures,58and58networks58that58enable58the58use58of58information58resources58in58the58or
ganization.
physical58security:58The58protection58of58material58items,58objects,58or58areas58from58unautho
rized58access58and58misuse.