100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

TEST BANK for Principles of information security 7th edition by Michael Whitman, Herbert Mattord . ISBN :978-0357506431 . 100% COMPLETE GUIDE with A+ GRADE assured Verified questions and answers. LATEST UPDATE!!

Rating
-
Sold
-
Pages
40
Grade
A+
Uploaded on
26-02-2025
Written in
2024/2025

TEST BANK for Principles of information security 7th edition by Michael Whitman, Herbert Mattord . ISBN :978-0357506431 . 100% COMPLETE GUIDE with A+ GRADE assured Verified questions and answers. LATEST UPDATE!!

Institution
Principles Of Information Security
Course
Principles of information Security











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Principles of information Security
Course
Principles of information Security

Document information

Uploaded on
February 26, 2025
Number of pages
40
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Instructor ManualPrinciples of Information Securit
r r r r rr




y,7th Edition byMichaelE.Whitman
r r r r r

,InstructorManual r




Whitman and Mattord, Principles of Information Security 7e, ISBN 978-0-357-50643-
r r r r r r r r r


1; Module 1: Introduction to Information Security
r r r r r r




Table of Contents r r




Purpose and Perspective of the Module.............................................................................................2
r r r r r



Cengage Supplements .....................................................................................................................2
r




Module Objectives ............................................................................................................................2
r



Complete List of Module Activities and Assessments.........................................................................2
r r r r r r



Key Terms.........................................................................................................................................3
r




What's New in This Module ................................................................................................................4
r r r r




Module Outline..................................................................................................................................4
r




DiscussionQuestions .....................................................................................................................15
r



Suggested Usage for Lab Activities .................................................................................................16
r r r r




Additional Activities and Assignments .............................................................................................17
r r r



Additional Resources ......................................................................................................................17
r




Cengage Video Resources............................................................................................................... 17
r r




Internet Resources ........................................................................................................................ 17
r




Appendix.........................................................................................................................................18
Grading Rubrics ............................................................................................................................ 18
r

,Purpose and Perspective of the Module r r r r r




The first module of the course in information security provides learners the foundational knowledge t
r r r r r r r r r r r r r r


o become well versed in the protection systems of any size need within an organization today. The m
r r r r r r r r r r r r r r r r r


odule begins with fundamental knowledge of what information security is and the how computer sec
r r r r r r r r r r r r r r


urity evolved into what we know now as information security today. Additionally, learners will gain kn
r r r r r r r r r r r r r r r


owledge on the how information security can be viewed either as an art or a science and why that is th
r r r r r r r r r r r r r r r r r r r r


e case.
r




Cengage Supplements r




The following product-
r r


level supplements are available in the Instructor Resource Center and provide additional informatio
r r r r r r r r r r r r


n that may help you in preparing your course:
r r r r r r r r




 PowerPoint slides r


 Test banks, available in Word, as LMS-ready files, and on the Cognero platform
r r r r r r r r r r r r


 MindTap Educator Guide r r


 Solution and Answer Guide r r r


 This instructor‘s manual
r r




Module Objectives r




The following objectives are addressed in this module:
r r r r r r r




1.1 Define information security. r r



1.2 Discuss the history of computer security and explain how it evolved into information sec
r r r r r r r r r r r r r


urity.
1.3 Define key terms and critical concepts of information security.
r r r r r r r r




1.4 Describe the information security roles of professionals within an organization.
r r r r r r r r r




Complete List of Module Activities and Assessments r r r r r r




For additional guidance refer to the MindTap Educator Guide.
r r r r r r r r




Module O r PPT slide r Activity/Assessment Duration
bjective
2 Icebreaker: Interview Simulation r r 10 minutes r


1.1–1.2 19–20 Knowledge Check Activity 1 r r r 2 minutes
r


1.3 34–35 Knowledge Check Activity 2 r r r 2 minutes
r


1.4 39–40 Knowledge Check Activity 3 r r r 2 minutes
r


1.1–1.4 MindTap Module 01 Review Questions r r r 30–40 minutes r


1.1 – 1.4
r r MindTap Module 01 Case Exercises r r r 30 minutes r


1.1 – 1.4
r r MindTap Module 01 Exercises r r 10–30 minutes per r r


question; 1+ hour per r r r


module
r


1.1 – 1.4
r r MindTap Module 01 Security for Life r r r r 1+ hour r


1.1 – 1.4
r r MindTap Module 01 Quiz r r 10–15 minutes r




[return to top] r r

, Key Terms r




In order of use:
r r r



computer security: In the early days of computers, this term specified the protection of the physical
r r r r r r r r r r r r r r r


location and assets associated with computer technology from outside threats, but it later came to re
r r r r r r r r r r r r r r r r


present all actions taken to protect computer systems from losses.
r r r r r r r r r



security: A state of being secure and free from danger or harm as well as the actions taken to make s
r r r r r r r r r r r r r r r r r r r r


omeone or something secure. r r r



information security: Protection of the confidentiality, integrity, and availability of information ass
r r r r r r r r r r r


ets, whether in storage, processing, or transmission, via the application of policy, education, training
r r r r r r r r r r r r r r


and awareness, and technology.
r r r



network security: A subset of communications security; the protection of voice and data networkin
r r r r r r r r r r r r r


g components, connections, and content.
r r r r



C.I.A. triad: The industry standard for computer security since the development of the mainframe; t
r r r r r r r r r r r r r r


he standard is based on three characteristics that describe the attributes of information that are impo
r r r r r r r r r r r r r r r


rtant to protect: confidentiality, integrity, and availability.
r r r r r r



confidentiality: An attribute of information that describes how data is protected from disclosure or e r r r r r r r r r r r r r r


xposure to unauthorized individuals or systems. r r r r r



personally identifiable information (PII): Information about a person‘s history, background, and
r r r r r r r r r r r


attributes that can be used to commit identity theft that typically includes a person‘s name, address,
r r r r r r r r r r r r r r r r


Social Security number, family information, employment history, and financial information.
r r r r r r r r r



integrity: An attribute of information that describes how data is whole, complete, and uncorrupted.
r r r r r r r r r r r r r




availability: An attribute of information that describes how data is accessible and correctly formatte
r r r r r r r r r r r r r


d for use without interference or obstruction.
r r r r r r



accuracy: An attribute of information that describes how data is free of errors and has the value that th
r r r r r r r r r r r r r r r r r r


e user expects.
r r



authenticity: An attribute of information that describes how data is genuine or original rather than re
r r r r r r r r r r r r r r r


produced or fabricated. r r



utility: An attribute of information that describes how data has value or usefulness for an end purpos
r r r r r r r r r r r r r r r r


e.
possession: An attribute of information that describes how the data‘s ownership or control is legitim
r r r r r r r r r r r r r r


ate or authorized.
r r



McCumber Cube: A graphical representation of the architectural approach used in computer and i
r r r r r r r r r r r r r


nformation security that is commonly shown as a cube composed of 3×3×3 cells, similar to a Rubik‘s
r r r r r r r r r r r r r r r r r


Cube.
information system: The entire set of software, hardware, data, people, procedures, and networksr r r r r r r r r r r r r


that enable the use of information resources in the organization.
r r r r r r r r r



physical security: The protection of material items, objects, or areas from unauthorized access and
r r r r r r r r r r r r r r


misuse.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Testprep Harvard University
View profile
Follow You need to be logged in order to follow users or courses
Sold
10
Member since
9 months
Number of followers
1
Documents
121
Last sold
1 month ago

3.0

2 reviews

5
1
4
0
3
0
2
0
1
1

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions