f ff
of Information Security, 7th Edition b
f f f ff f f
y Michael E. Whitman
f f f
,InstructorManual f
WhitmanfandfMattord,fPrinciplesfoffInformationfSecurityf7e,fISBNf978-0-357-50643-
1;fModulef1:fIntroductionftofInformationfSecurity
Table of Contents
f f
PurposefandfPerspectivefoffthefModule ......................................................................................... 2
CengagefSupplements ................................................................................................................ 2
ModulefObjectives ....................................................................................................................... 2
CompletefListfoffModulefActivitiesfandfAssessments...................................................................... 2
KeyfTerms ................................................................................................................................... 3
What'sfNewfinfThisfModule ........................................................................................................... 4
ModulefOutline ............................................................................................................................ 4
DiscussionfQuestions ................................................................................................................ 15
SuggestedfUsagefforfLabfActivities ............................................................................................. 16
AdditionalfActivitiesfandfAssignments ......................................................................................... 17
AdditionalfResources ................................................................................................................. 17
CengagefVideofResources......................................................................................................................... 17
InternetfResources ................................................................................................................................... 17
Appendix ................................................................................................................................... 18
GradingfRubrics ........................................................................................................................................ 18
,Purpose and Perspective of the Module
f f f f f
Theffirstfmodulefoffthefcoursefinfinformationfsecurityfprovidesflearnersftheffoundationalfknowledgeft
ofbecomefwellfversedfinfthefprotectionfsystemsfoffanyfsizefneedfwithinfanforganizationftoday.fThefm
odulefbeginsfwithffundamentalfknowledgefoffwhatfinformationfsecurityfisfandfthefhowfcomputerfsec
urityfevolvedfintofwhatfwefknowfnowfasfinformationfsecurityftoday.fAdditionally,flearnersfwillfgainfkn
owledgefonfthefhowfinformationfsecurityfcanfbefviewedfeitherfasfanfartforfafsciencefandfwhyfthatfisfth
efcase.
Cengage Supplements f
Theffollowingfproduct-
levelfsupplementsfarefavailablefinfthefInstructorfResourcefCenterfandfprovidefadditionalfinformatio
nfthatfmayfhelpfyoufinfpreparingfyourfcourse:
PowerPointfslides
Testfbanks,favailablefinfWord,fasfLMS-readyffiles,fandfonfthefCognerofplatform
MindTapfEducatorfGuide
SolutionfandfAnswerfGuide
Thisfinstructor‘sfmanual
Module Objectives
f
Theffollowingfobjectivesfarefaddressedfinfthisfmodule:
1.1 Definefinformationfsecurity.
1.2 Discussfthefhistoryfoffcomputerfsecurityfandfexplainfhowfitfevolvedfintofinformationfsec
urity.
1.3 Definefkeyftermsfandfcriticalfconceptsfoffinformationfsecurity.
1.4 Describefthefinformationfsecurityfrolesfoffprofessionalsfwithinfanforganization.
Complete List of Module Activities and Assessments
f f f f f f
ForfadditionalfguidancefreferftofthefMindTapfEducatorfGuide.
ModulefO PPTfslide Activity/Assessment Duration
bjective
2 Icebreaker:fInterviewfSimulation 10fminutes
1.1–1.2 19–20 KnowledgefCheckfActivityf1 2fminutes
1.3 34–35 KnowledgefCheckfActivityf2 2fminutes
1.4 39–40 KnowledgefCheckfActivityf3 2fminutes
1.1–1.4 MindTap Modulef01fReviewfQuestions 30–40fminutes
1.1f–f1.4 MindTap Modulef01fCasefExercises 30fminutes
1.1f–f1.4 MindTap Modulef01fExercises 10–30fminutesfper
question;f1+fhourfper
fmodule
1.1f–f1.4 MindTap Modulef01fSecurityfforfLife 1+fhour
1.1f–f1.4 MindTap Modulef01fQuiz 10–15fminutes
[returnftoftop]
, Key Terms
f
Inforderfoffuse:
computerfsecurity:fInfthefearlyfdaysfoffcomputers,fthisftermfspecifiedfthefprotectionfoffthefphysical
flocationfandfassetsfassociatedfwithfcomputerftechnologyffromfoutsidefthreats,fbutfitflaterfcameftofre
presentfallfactionsftakenftofprotectfcomputerfsystemsffromflosses.
security:fAfstatefoffbeingfsecurefandffreeffromfdangerforfharmfasfwellfasfthefactionsftakenftofmakefs
omeoneforfsomethingfsecure.
informationfsecurity:fProtectionfoffthefconfidentiality,fintegrity,fandfavailabilityfoffinformationfassets,fw
hetherfinfstorage,fprocessing,forftransmission,fviafthefapplicationfoffpolicy,feducation,ftrainingfandfaware
ness,fandftechnology.
networkfsecurity:fAfsubsetfoffcommunicationsfsecurity;fthefprotectionfoffvoicefandfdatafnetw
orkingfcomponents,fconnections,fandfcontent.
C.I.A.ftriad:fThefindustryfstandardfforfcomputerfsecurityfsincefthefdevelopmentfoffthefmainfr
ame;fthefstandardfisfbasedfonfthreefcharacteristicsfthatfdescribefthefattributesfoffinformationft
hatfarefimportantftofprotect:fconfidentiality,fintegrity,fandfavailability.
confidentiality:fAnfattributefoffinformationfthatfdescribesfhowfdatafisfprotectedffromfdisclosureforfe
xposureftofunauthorizedfindividualsforfsystems.
personallyfidentifiablefinformationf(PII):fInformationfaboutfafperson‘sfhistory,fbackground,fandf
attributesfthatfcanfbefusedftofcommitfidentityftheftfthatftypicallyfincludesfafperson‘sfname,faddress,f
SocialfSecurityfnumber,ffamilyfinformation,femploymentfhistory,fandffinancialfinformation.
integrity:fAnfattributefoffinformationfthatfdescribesfhowfdatafisfwhole,fcomplete,fandfuncorrup
ted.
availability:fAnfattributefoffinformationfthatfdescribesfhowfdatafisfaccessiblefandfcorrectlyfformatte
dfforfusefwithoutfinterferenceforfobstruction.
accuracy:fAnfattributefoffinformationfthatfdescribesfhowfdatafisffreefofferrorsfandfhasfthefvaluefthatft
hefuserfexpects.
authenticity:fAnfattributefoffinformationfthatfdescribesfhowfdatafisfgenuineforforiginalfratherfthanfre
producedforffabricated.
utility:fAnfattributefoffinformationfthatfdescribesfhowfdatafhasfvalueforfusefulnessfforfanfendfpurpose.
possession:fAnfattributefoffinformationfthatfdescribesfhowfthefdata‘sfownershipforfcontrolfisflegitimatefo
rfauthorized.
McCumberfCube:fAfgraphicalfrepresentationfoffthefarchitecturalfapproachfusedfinfcomputerfandfi
nformationfsecurityfthatfisfcommonlyfshownfasfafcubefcomposedfoff3×3×3fcells,fsimilarftofafRubik‘sf
Cube.
informationfsystem:fThefentirefsetfoffsoftware,fhardware,fdata,fpeople,fprocedures,fandfnet
worksfthatfenablefthefusefoffinformationfresourcesfinftheforganization.
physicalfsecurity:fThefprotectionfoffmaterialfitems,fobjects,forfareasffromfunauthorizedfaccessfandf
misuse.