Instructor ManualPrinciples of Information Securit
r r r r rr
y,7th Edition byMichaelE.Whitman
r r r r r
,InstructorManual r
Whitman and Mattord, Principles of Information Security 7e, ISBN 978-0-357-50643-
r r r r r r r r r
1; Module 1: Introduction to Information Security
r r r r r r
Table of Contents r r
Purpose and Perspective of the Module.............................................................................................2
r r r r r
Cengage Supplements .....................................................................................................................2
r
Module Objectives ............................................................................................................................2
r
Complete List of Module Activities and Assessments.........................................................................2
r r r r r r
Key Terms.........................................................................................................................................3
r
What's New in This Module ................................................................................................................4
r r r r
Module Outline..................................................................................................................................4
r
DiscussionQuestions .....................................................................................................................15
r
Suggested Usage for Lab Activities .................................................................................................16
r r r r
Additional Activities and Assignments .............................................................................................17
r r r
Additional Resources ......................................................................................................................17
r
Cengage Video Resources............................................................................................................... 17
r r
Internet Resources ........................................................................................................................ 17
r
Appendix.........................................................................................................................................18
Grading Rubrics ............................................................................................................................ 18
r
,Purpose and Perspective of the Module r r r r r
The first module of the course in information security provides learners the foundational knowledge t
r r r r r r r r r r r r r r
o become well versed in the protection systems of any size need within an organization today. The m
r r r r r r r r r r r r r r r r r
odule begins with fundamental knowledge of what information security is and the how computer sec
r r r r r r r r r r r r r r
urity evolved into what we know now as information security today. Additionally, learners will gain kn
r r r r r r r r r r r r r r r
owledge on the how information security can be viewed either as an art or a science and why that is th
r r r r r r r r r r r r r r r r r r r r
e case.
r
Cengage Supplements r
The following product-
r r
level supplements are available in the Instructor Resource Center and provide additional informatio
r r r r r r r r r r r r
n that may help you in preparing your course:
r r r r r r r r
PowerPoint slides r
Test banks, available in Word, as LMS-ready files, and on the Cognero platform
r r r r r r r r r r r r
MindTap Educator Guide r r
Solution and Answer Guide r r r
This instructor‘s manual
r r
Module Objectives r
The following objectives are addressed in this module:
r r r r r r r
1.1 Define information security. r r
1.2 Discuss the history of computer security and explain how it evolved into information sec
r r r r r r r r r r r r r
urity.
1.3 Define key terms and critical concepts of information security.
r r r r r r r r
1.4 Describe the information security roles of professionals within an organization.
r r r r r r r r r
Complete List of Module Activities and Assessments r r r r r r
For additional guidance refer to the MindTap Educator Guide.
r r r r r r r r
Module O r PPT slide r Activity/Assessment Duration
bjective
2 Icebreaker: Interview Simulation r r 10 minutes r
1.1–1.2 19–20 Knowledge Check Activity 1 r r r 2 minutes
r
1.3 34–35 Knowledge Check Activity 2 r r r 2 minutes
r
1.4 39–40 Knowledge Check Activity 3 r r r 2 minutes
r
1.1–1.4 MindTap Module 01 Review Questions r r r 30–40 minutes r
1.1 – 1.4
r r MindTap Module 01 Case Exercises r r r 30 minutes r
1.1 – 1.4
r r MindTap Module 01 Exercises r r 10–30 minutes per r r
question; 1+ hour per r r r
module
r
1.1 – 1.4
r r MindTap Module 01 Security for Life r r r r 1+ hour r
1.1 – 1.4
r r MindTap Module 01 Quiz r r 10–15 minutes r
[return to top] r r
, Key Terms r
In order of use:
r r r
computer security: In the early days of computers, this term specified the protection of the physical
r r r r r r r r r r r r r r r
location and assets associated with computer technology from outside threats, but it later came to re
r r r r r r r r r r r r r r r r
present all actions taken to protect computer systems from losses.
r r r r r r r r r
security: A state of being secure and free from danger or harm as well as the actions taken to make s
r r r r r r r r r r r r r r r r r r r r
omeone or something secure. r r r
information security: Protection of the confidentiality, integrity, and availability of information ass
r r r r r r r r r r r
ets, whether in storage, processing, or transmission, via the application of policy, education, training
r r r r r r r r r r r r r r
and awareness, and technology.
r r r
network security: A subset of communications security; the protection of voice and data networkin
r r r r r r r r r r r r r
g components, connections, and content.
r r r r
C.I.A. triad: The industry standard for computer security since the development of the mainframe; t
r r r r r r r r r r r r r r
he standard is based on three characteristics that describe the attributes of information that are impo
r r r r r r r r r r r r r r r
rtant to protect: confidentiality, integrity, and availability.
r r r r r r
confidentiality: An attribute of information that describes how data is protected from disclosure or e r r r r r r r r r r r r r r
xposure to unauthorized individuals or systems. r r r r r
personally identifiable information (PII): Information about a person‘s history, background, and
r r r r r r r r r r r
attributes that can be used to commit identity theft that typically includes a person‘s name, address,
r r r r r r r r r r r r r r r r
Social Security number, family information, employment history, and financial information.
r r r r r r r r r
integrity: An attribute of information that describes how data is whole, complete, and uncorrupted.
r r r r r r r r r r r r r
availability: An attribute of information that describes how data is accessible and correctly formatte
r r r r r r r r r r r r r
d for use without interference or obstruction.
r r r r r r
accuracy: An attribute of information that describes how data is free of errors and has the value that th
r r r r r r r r r r r r r r r r r r
e user expects.
r r
authenticity: An attribute of information that describes how data is genuine or original rather than re
r r r r r r r r r r r r r r r
produced or fabricated. r r
utility: An attribute of information that describes how data has value or usefulness for an end purpos
r r r r r r r r r r r r r r r r
e.
possession: An attribute of information that describes how the data‘s ownership or control is legitim
r r r r r r r r r r r r r r
ate or authorized.
r r
McCumber Cube: A graphical representation of the architectural approach used in computer and i
r r r r r r r r r r r r r
nformation security that is commonly shown as a cube composed of 3×3×3 cells, similar to a Rubik‘s
r r r r r r r r r r r r r r r r r
Cube.
information system: The entire set of software, hardware, data, people, procedures, and networksr r r r r r r r r r r r r
that enable the use of information resources in the organization.
r r r r r r r r r
physical security: The protection of material items, objects, or areas from unauthorized access and
r r r r r r r r r r r r r r
misuse.
r r r r rr
y,7th Edition byMichaelE.Whitman
r r r r r
,InstructorManual r
Whitman and Mattord, Principles of Information Security 7e, ISBN 978-0-357-50643-
r r r r r r r r r
1; Module 1: Introduction to Information Security
r r r r r r
Table of Contents r r
Purpose and Perspective of the Module.............................................................................................2
r r r r r
Cengage Supplements .....................................................................................................................2
r
Module Objectives ............................................................................................................................2
r
Complete List of Module Activities and Assessments.........................................................................2
r r r r r r
Key Terms.........................................................................................................................................3
r
What's New in This Module ................................................................................................................4
r r r r
Module Outline..................................................................................................................................4
r
DiscussionQuestions .....................................................................................................................15
r
Suggested Usage for Lab Activities .................................................................................................16
r r r r
Additional Activities and Assignments .............................................................................................17
r r r
Additional Resources ......................................................................................................................17
r
Cengage Video Resources............................................................................................................... 17
r r
Internet Resources ........................................................................................................................ 17
r
Appendix.........................................................................................................................................18
Grading Rubrics ............................................................................................................................ 18
r
,Purpose and Perspective of the Module r r r r r
The first module of the course in information security provides learners the foundational knowledge t
r r r r r r r r r r r r r r
o become well versed in the protection systems of any size need within an organization today. The m
r r r r r r r r r r r r r r r r r
odule begins with fundamental knowledge of what information security is and the how computer sec
r r r r r r r r r r r r r r
urity evolved into what we know now as information security today. Additionally, learners will gain kn
r r r r r r r r r r r r r r r
owledge on the how information security can be viewed either as an art or a science and why that is th
r r r r r r r r r r r r r r r r r r r r
e case.
r
Cengage Supplements r
The following product-
r r
level supplements are available in the Instructor Resource Center and provide additional informatio
r r r r r r r r r r r r
n that may help you in preparing your course:
r r r r r r r r
PowerPoint slides r
Test banks, available in Word, as LMS-ready files, and on the Cognero platform
r r r r r r r r r r r r
MindTap Educator Guide r r
Solution and Answer Guide r r r
This instructor‘s manual
r r
Module Objectives r
The following objectives are addressed in this module:
r r r r r r r
1.1 Define information security. r r
1.2 Discuss the history of computer security and explain how it evolved into information sec
r r r r r r r r r r r r r
urity.
1.3 Define key terms and critical concepts of information security.
r r r r r r r r
1.4 Describe the information security roles of professionals within an organization.
r r r r r r r r r
Complete List of Module Activities and Assessments r r r r r r
For additional guidance refer to the MindTap Educator Guide.
r r r r r r r r
Module O r PPT slide r Activity/Assessment Duration
bjective
2 Icebreaker: Interview Simulation r r 10 minutes r
1.1–1.2 19–20 Knowledge Check Activity 1 r r r 2 minutes
r
1.3 34–35 Knowledge Check Activity 2 r r r 2 minutes
r
1.4 39–40 Knowledge Check Activity 3 r r r 2 minutes
r
1.1–1.4 MindTap Module 01 Review Questions r r r 30–40 minutes r
1.1 – 1.4
r r MindTap Module 01 Case Exercises r r r 30 minutes r
1.1 – 1.4
r r MindTap Module 01 Exercises r r 10–30 minutes per r r
question; 1+ hour per r r r
module
r
1.1 – 1.4
r r MindTap Module 01 Security for Life r r r r 1+ hour r
1.1 – 1.4
r r MindTap Module 01 Quiz r r 10–15 minutes r
[return to top] r r
, Key Terms r
In order of use:
r r r
computer security: In the early days of computers, this term specified the protection of the physical
r r r r r r r r r r r r r r r
location and assets associated with computer technology from outside threats, but it later came to re
r r r r r r r r r r r r r r r r
present all actions taken to protect computer systems from losses.
r r r r r r r r r
security: A state of being secure and free from danger or harm as well as the actions taken to make s
r r r r r r r r r r r r r r r r r r r r
omeone or something secure. r r r
information security: Protection of the confidentiality, integrity, and availability of information ass
r r r r r r r r r r r
ets, whether in storage, processing, or transmission, via the application of policy, education, training
r r r r r r r r r r r r r r
and awareness, and technology.
r r r
network security: A subset of communications security; the protection of voice and data networkin
r r r r r r r r r r r r r
g components, connections, and content.
r r r r
C.I.A. triad: The industry standard for computer security since the development of the mainframe; t
r r r r r r r r r r r r r r
he standard is based on three characteristics that describe the attributes of information that are impo
r r r r r r r r r r r r r r r
rtant to protect: confidentiality, integrity, and availability.
r r r r r r
confidentiality: An attribute of information that describes how data is protected from disclosure or e r r r r r r r r r r r r r r
xposure to unauthorized individuals or systems. r r r r r
personally identifiable information (PII): Information about a person‘s history, background, and
r r r r r r r r r r r
attributes that can be used to commit identity theft that typically includes a person‘s name, address,
r r r r r r r r r r r r r r r r
Social Security number, family information, employment history, and financial information.
r r r r r r r r r
integrity: An attribute of information that describes how data is whole, complete, and uncorrupted.
r r r r r r r r r r r r r
availability: An attribute of information that describes how data is accessible and correctly formatte
r r r r r r r r r r r r r
d for use without interference or obstruction.
r r r r r r
accuracy: An attribute of information that describes how data is free of errors and has the value that th
r r r r r r r r r r r r r r r r r r
e user expects.
r r
authenticity: An attribute of information that describes how data is genuine or original rather than re
r r r r r r r r r r r r r r r
produced or fabricated. r r
utility: An attribute of information that describes how data has value or usefulness for an end purpos
r r r r r r r r r r r r r r r r
e.
possession: An attribute of information that describes how the data‘s ownership or control is legitim
r r r r r r r r r r r r r r
ate or authorized.
r r
McCumber Cube: A graphical representation of the architectural approach used in computer and i
r r r r r r r r r r r r r
nformation security that is commonly shown as a cube composed of 3×3×3 cells, similar to a Rubik‘s
r r r r r r r r r r r r r r r r r
Cube.
information system: The entire set of software, hardware, data, people, procedures, and networksr r r r r r r r r r r r r
that enable the use of information resources in the organization.
r r r r r r r r r
physical security: The protection of material items, objects, or areas from unauthorized access and
r r r r r r r r r r r r r r
misuse.