100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Instructor Manual Principles of Information Security, 7th Edition by Michael E.Whitman

Rating
-
Sold
-
Pages
49
Grade
A+
Uploaded on
01-03-2025
Written in
2024/2025

Instructor Manual Principles of Information Security, 7th Edition by Michael E.Whitman

Institution
Principles Of Information Security, 7th Edi
Course
Principles Of Information Security, 7th Edi











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Principles Of Information Security, 7th Edi
Course
Principles Of Information Security, 7th Edi

Document information

Uploaded on
March 1, 2025
Number of pages
49
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Instructor Manual Principles of Information Secur
g1 g1 g1 g1 g1g1




ity, 7th Edition by Michael E.Whitman
g1 g1 g1 g1 g1

,Instructor Manual g1




Whitman and Mattord, Principles of Information Security 7e, ISBN 978-0-357-50643-
g1 g1 g1 g1 g1 g1 g1 g1 g1


1; Module 1: Introduction to Information Security
g1 g1 g1 g1 g1 g1




Table of Contentsg1 g1




Purpose and Perspective of the Module .................................................................................... 2
g1 g1 g1 g1 g1



Cengage Supplements ................................................................................................................ 2
g1



Module Objectives ...................................................................................................................... 2
g1



Complete List of Module Activities and Assessments ................................................................ 2
g1 g1 g1 g1 g1 g1



Key Terms .................................................................................................................................. 3
g1



What's New in This Module........................................................................................................ 4
g1 g1 g1 g1



Module Outline............................................................................................................................ 4
g1



Discussion Questions ................................................................................................................ 15
g1



Suggested Usage for Lab Activities.......................................................................................... 16
g1 g1 g1 g1



Additional Activities and Assignments....................................................................................... 17
g1 g1 g1



Additional Resources ................................................................................................................ 17
g1



Cengage Video Resources ....................................................................................................................... 17
g1 g1



Internet Resources .................................................................................................................................. 17
g1



Appendix ................................................................................................................................... 18
Grading Rubrics ....................................................................................................................................... 18
g1

,Purpose and Perspective of the Module g1 g1 g1 g1 g1




The first module of the course in information security provides learners the foundational kno
g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1


wledge to become well versed in the protection systems of any size need within an organiz
g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1


ation today. The module begins with fundamental knowledge of what information security is
g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g


and the how computer security evolved into what we know now as information security tod
1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1


ay. Additionally, learners will gain knowledge on the how information security can be viewed
g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g


either as an art or a science and why that is the case.
1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1




Cengage Supplements g1




The following product-
g1 g1


level supplements are available in the Instructor Resource Center and provide additional inf
g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1


ormation that may help you in preparing your course:
g1 g1 g1 g1 g1 g1 g1 g1



 PowerPoint slides g1


 Test banks, available in Word, as LMS-ready files, and on the Cognero platform
g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1


 MindTap Educator Guide g1 g1


 Solution and Answer Guide g1 g1 g1


 This instructor‘s manual
g1 g1




Module Objectives g1




The following objectives are addressed in this module:
g1 g1 g1 g1 g1 g1 g1



1.1 Define information security. g1 g1



1.2 Discuss the history of computer security and explain how it evolved into informat
g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1


ion security. g1



1.3 Define key terms and critical concepts of information security.
g1 g1 g1 g1 g1 g1 g1 g1



1.4 Describe the information security roles of professionals within an organization.
g1 g1 g1 g1 g1 g1 g1 g1 g1




Complete List of Module Activities and Assessments g1 g1 g1 g1 g1 g1




For additional guidance refer to the MindTap Educator Guide.
g1 g1 g1 g1 g1 g1 g1 g1




Module g1 PPT slide g1 Activity/Assessment Duration
Objective
2 Icebreaker: Interview Simulation g1 g1 10 minutes
g1


1.1–1.2 19–20 Knowledge Check Activity 1 g1 g1 g1 2 minutes
g1


1.3 34–35 Knowledge Check Activity 2 g1 g1 g1 2 minutes
g1


1.4 39–40 Knowledge Check Activity 3 g1 g1 g1 2 minutes
g1


1.1–1.4 MindTap Module 01 Review Questions g1 g1 g1 30–40 minutes g1


1.1 – 1.4
g1 g1 MindTap Module 01 Case Exercises g1 g1 g1 30 minutes
g1


1.1 – 1.4
g1 g1 MindTap Module 01 Exercises g1 g1 10–30 minutes perg1 g1


question; 1+ hour p g1 g1 g1


er module
g1


1.1 – 1.4
g1 g1 MindTap Module 01 Security for Life g1 g1 g1 g1 1+ hour
g1


1.1 – 1.4
g1 g1 MindTap Module 01 Quiz g1 g1 10–15 minutes g1



[return to top] g1 g1

, Key Terms g1




In order of use:
g1 g1 g1



computer security: In the early days of computers, this term specified the protection of th
g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1


e physical location and assets associated with computer technology from outside threats, bu
g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1


t it later came to represent all actions taken to protect computer systems from losses.
g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1



security: A state of being secure and free from danger or harm as well as the actions take
g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1


n to make someone or something secure.
g1 g1 g1 g1 g1 g1



information security: Protection of the confidentiality, integrity, and availability of informati
g1 g1 g1 g1 g1 g1 g1 g1 g1 g1


on assets, whether in storage, processing, or transmission, via the application of policy, edu
g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1


cation, training and awareness, and technology.
g1 g1 g1 g1 g1



network security: A subset of communications security; the protection of voice and data ne
g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1


tworking components, connections, and content.
g1 g1 g1 g1



C.I.A. triad: The industry standard for computer security since the development of the mai
g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1


nframe; the standard is based on three characteristics that describe the attributes of informa
g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1


tion that are important to protect: confidentiality, integrity, and availability.
g1 g1 g1 g1 g1 g1 g1 g1 g1



confidentiality: An attribute of information that describes how data is protected from disclos
g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1


ure or exposure to unauthorized individuals or systems.
g1 g1 g1 g1 g1 g1 g1



personally identifiable information (PII): Information about a person‘s history, background
g1 g1 g1 g1 g1 g1 g1 g1 g1


, and attributes that can be used to commit identity theft that typically includes a person‘s n
g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1


ame, address, Social Security number, family information, employment history, and financial
g1 g1 g1 g1 g1 g1 g1 g1 g1 g1


information.
g1



integrity: An attribute of information that describes how data is whole, complete, and uncorr
g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1


upted.
availability: An attribute of information that describes how data is accessible and correctly f
g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1


ormatted for use without interference or obstruction.
g1 g1 g1 g1 g1 g1



accuracy: An attribute of information that describes how data is free of errors and has the v
g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1


alue that the user expects.
g1 g1 g1 g1



authenticity: An attribute of information that describes how data is genuine or original rathe
g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1


r than reproduced or fabricated.
g1 g1 g1 g1



utility: An attribute of information that describes how data has value or usefulness for an e
g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1


nd purpose.
g1



possession: An attribute of information that describes how the data‘s ownership or control i
g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1


s legitimate or authorized.
g1 g1 g1



McCumber Cube: A graphical representation of the architectural approach used in comput
g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1


er and information security that is commonly shown as a cube composed of 3×3×3 cells, si
g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1


milar to a Rubik‘s Cube.
g1 g1 g1 g1



information system: The entire set of software, hardware, data, people, procedures, and n
g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1


etworks that enable the use of information resources in the organization.
g1 g1 g1 g1 g1 g1 g1 g1 g1 g1



physical security: The protection of material items, objects, or areas from unauthorized acce
g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1 g1


ss and misuse.
g1 g1

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TESTBANKOFFER Harvard university
View profile
Follow You need to be logged in order to follow users or courses
Sold
103
Member since
9 months
Number of followers
1
Documents
479
Last sold
4 days ago
WELCOME TO BEST OFFER TESTBANKS AND SOLUTION MANUALS

Welcome to my shop TITLED [TESTBANKOFFER] where i offer best verified Testbanks& Solution Manuals At affordable price....... thankyou .........

4.4

37 reviews

5
26
4
4
3
3
2
2
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions